Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 21:14
Static task
static1
Behavioral task
behavioral1
Sample
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe
Resource
win7-20240708-en
General
-
Target
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe
-
Size
4.9MB
-
MD5
a521b23108ca72a0a8e837bb4bc6c309
-
SHA1
a80623d726004b9c0086377c19f822a67af0c490
-
SHA256
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec
-
SHA512
33835665ab96cb1d5ffe46fa6706e519c8314c6280967c18a265d1ceaae625691c3a65cc90a15cac48386a22162aa9631fcc0024360fff6970a76ed98cc0d21e
-
SSDEEP
49152:bl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8r:j
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
Colibri family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 54 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5100 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4644 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5056 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4248 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3872 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4964 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5012 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4764 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3740 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3200 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 760 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4088 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3796 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1764 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 892 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4908 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4976 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5088 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3052 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4028 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 808 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2752 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3176 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3648 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3464 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1620 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3500 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3428 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2100 3760 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 744 3760 schtasks.exe 83 -
Processes:
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exelsass.exelsass.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" -
Processes:
resource yara_rule behavioral2/memory/4916-3-0x000000001BAA0000-0x000000001BBCE000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 4928 powershell.exe 3596 powershell.exe 3984 powershell.exe 4612 powershell.exe 936 powershell.exe 2248 powershell.exe 4584 powershell.exe 4272 powershell.exe 1920 powershell.exe 2916 powershell.exe 5032 powershell.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exelsass.exelsass.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation -
Executes dropped EXE 64 IoCs
Processes:
tmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exepid Process 1464 tmp9184.tmp.exe 2704 tmp9184.tmp.exe 1524 tmp9184.tmp.exe 4424 tmp9184.tmp.exe 4376 tmp9184.tmp.exe 3632 tmp9184.tmp.exe 4416 tmp9184.tmp.exe 4348 tmp9184.tmp.exe 2024 tmp9184.tmp.exe 1368 tmp9184.tmp.exe 3584 tmp9184.tmp.exe 3252 tmp9184.tmp.exe 624 tmp9184.tmp.exe 228 tmp9184.tmp.exe 2552 tmp9184.tmp.exe 4420 tmp9184.tmp.exe 908 tmp9184.tmp.exe 4340 tmp9184.tmp.exe 4964 tmp9184.tmp.exe 2756 tmp9184.tmp.exe 2264 tmp9184.tmp.exe 1760 tmp9184.tmp.exe 4264 tmp9184.tmp.exe 4484 tmp9184.tmp.exe 4632 tmp9184.tmp.exe 1944 tmp9184.tmp.exe 2988 tmp9184.tmp.exe 1532 tmp9184.tmp.exe 4588 tmp9184.tmp.exe 4936 tmp9184.tmp.exe 3660 tmp9184.tmp.exe 4976 tmp9184.tmp.exe 3516 tmp9184.tmp.exe 804 tmp9184.tmp.exe 1948 tmp9184.tmp.exe 4896 tmp9184.tmp.exe 3836 tmp9184.tmp.exe 3052 tmp9184.tmp.exe 4148 tmp9184.tmp.exe 4136 tmp9184.tmp.exe 3984 tmp9184.tmp.exe 3996 tmp9184.tmp.exe 3224 tmp9184.tmp.exe 1872 tmp9184.tmp.exe 2784 tmp9184.tmp.exe 1128 tmp9184.tmp.exe 3676 tmp9184.tmp.exe 3300 tmp9184.tmp.exe 2160 tmp9184.tmp.exe 752 tmp9184.tmp.exe 1124 tmp9184.tmp.exe 2972 tmp9184.tmp.exe 2600 tmp9184.tmp.exe 4528 tmp9184.tmp.exe 3768 tmp9184.tmp.exe 3928 tmp9184.tmp.exe 1036 tmp9184.tmp.exe 4432 tmp9184.tmp.exe 1380 tmp9184.tmp.exe 4616 tmp9184.tmp.exe 3440 tmp9184.tmp.exe 2172 tmp9184.tmp.exe 5100 tmp9184.tmp.exe 4644 tmp9184.tmp.exe -
Processes:
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exelsass.exelsass.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lsass.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" -
Suspicious use of SetThreadContext 7 IoCs
Processes:
tmpC61F.tmp.exedescription pid Process procid_target PID 2692 set thread context of 112 2692 tmpC61F.tmp.exe 715 PID 3740 set thread context of 1820 3740 1598 PID 2900 set thread context of 4380 2900 2641 PID 4968 set thread context of 3184 4968 4249 PID 392 set thread context of 3564 392 4511 PID 4000 set thread context of 4612 4000 5300 PID 2344 set thread context of 4380 2344 6177 -
Drops file in Program Files directory 32 IoCs
Processes:
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exedescription ioc Process File created C:\Program Files (x86)\Internet Explorer\en-US\Registry.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\69ddcba757bf72 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Internet Explorer\en-US\ee2ad38f3d4382 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\smss.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dwm.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files\Windows NT\Accessories\it-IT\dllhost.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows NT\Registry.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\smss.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\RCXB1AF.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows Defender\it-IT\sihost.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows NT\Registry.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows NT\ee2ad38f3d4382 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows Mail\RCX9A53.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\dwm.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows Portable Devices\cc11b995f2a76d bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files\Windows NT\Accessories\it-IT\5940a34987c991 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows NT\RCX9C67.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows Defender\it-IT\66fc9ff0ee96c2 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\sihost.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows Mail\services.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\RCXAF9A.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows Portable Devices\winlogon.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files\Windows NT\Accessories\it-IT\dllhost.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows Mail\c5b4cb5e9653cc bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows Portable Devices\winlogon.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\6cb0b6c459d5d3 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\RCX9211.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\RCXA4A8.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\Registry.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files\Windows NT\Accessories\it-IT\RCXB3B3.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Program Files (x86)\Windows Mail\services.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\RCXAAF5.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe -
Drops file in Windows directory 8 IoCs
Processes:
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exedescription ioc Process File opened for modification C:\Windows\TAPI\RCXA8D1.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Windows\TAPI\explorer.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Windows\L2Schemas\lsass.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Windows\L2Schemas\lsass.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Windows\L2Schemas\6203df4a6bafc7 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Windows\TAPI\explorer.exe bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File created C:\Windows\TAPI\7a0fd90576e088 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe File opened for modification C:\Windows\L2Schemas\RCX8FFC.tmp bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9184.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Modifies registry class 11 IoCs
Processes:
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exelsass.exelsass.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings -
Scheduled Task/Job: Scheduled Task 1 TTPs 54 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 2784 schtasks.exe 2552 schtasks.exe 3500 schtasks.exe 5064 schtasks.exe 1636 schtasks.exe 5056 schtasks.exe 5012 schtasks.exe 3428 schtasks.exe 216 schtasks.exe 1140 schtasks.exe 908 schtasks.exe 2800 schtasks.exe 892 schtasks.exe 1620 schtasks.exe 4644 schtasks.exe 2864 schtasks.exe 2744 schtasks.exe 3052 schtasks.exe 4908 schtasks.exe 2428 schtasks.exe 744 schtasks.exe 2636 schtasks.exe 1044 schtasks.exe 760 schtasks.exe 4088 schtasks.exe 4468 schtasks.exe 5088 schtasks.exe 1924 schtasks.exe 4896 schtasks.exe 2752 schtasks.exe 4764 schtasks.exe 3740 schtasks.exe 1764 schtasks.exe 1876 schtasks.exe 2516 schtasks.exe 2100 schtasks.exe 3872 schtasks.exe 2756 schtasks.exe 4248 schtasks.exe 3200 schtasks.exe 5100 schtasks.exe 1604 schtasks.exe 2296 schtasks.exe 3796 schtasks.exe 4028 schtasks.exe 3140 schtasks.exe 1920 schtasks.exe 3648 schtasks.exe 4964 schtasks.exe 4976 schtasks.exe 3176 schtasks.exe 3464 schtasks.exe 1888 schtasks.exe 808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exelsass.exelsass.exepid Process 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 4612 powershell.exe 4612 powershell.exe 3596 powershell.exe 3596 powershell.exe 2916 powershell.exe 2916 powershell.exe 2248 powershell.exe 2248 powershell.exe 4584 powershell.exe 4584 powershell.exe 5032 powershell.exe 5032 powershell.exe 1920 powershell.exe 1920 powershell.exe 936 powershell.exe 936 powershell.exe 3984 powershell.exe 3984 powershell.exe 4928 powershell.exe 4928 powershell.exe 4272 powershell.exe 4272 powershell.exe 2248 powershell.exe 4272 powershell.exe 936 powershell.exe 4612 powershell.exe 3984 powershell.exe 3596 powershell.exe 2916 powershell.exe 5032 powershell.exe 1920 powershell.exe 4584 powershell.exe 4928 powershell.exe 4088 lsass.exe 4088 lsass.exe 4800 lsass.exe 4424 1540 4844 3056 4964 400 2988 392 -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exelsass.exelsass.exedescription pid Process Token: SeDebugPrivilege 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Token: SeDebugPrivilege 4612 powershell.exe Token: SeDebugPrivilege 3596 powershell.exe Token: SeDebugPrivilege 2916 powershell.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeDebugPrivilege 4584 powershell.exe Token: SeDebugPrivilege 5032 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 936 powershell.exe Token: SeDebugPrivilege 3984 powershell.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 4272 powershell.exe Token: SeDebugPrivilege 4088 lsass.exe Token: SeDebugPrivilege 4800 lsass.exe Token: SeDebugPrivilege 4424 Token: SeDebugPrivilege 1540 Token: SeDebugPrivilege 4844 Token: SeDebugPrivilege 3056 Token: SeDebugPrivilege 4964 Token: SeDebugPrivilege 400 Token: SeDebugPrivilege 2988 Token: SeDebugPrivilege 392 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exetmp9184.tmp.exedescription pid Process procid_target PID 4916 wrote to memory of 1464 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 138 PID 4916 wrote to memory of 1464 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 138 PID 4916 wrote to memory of 1464 4916 bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe 138 PID 1464 wrote to memory of 2704 1464 tmp9184.tmp.exe 140 PID 1464 wrote to memory of 2704 1464 tmp9184.tmp.exe 140 PID 1464 wrote to memory of 2704 1464 tmp9184.tmp.exe 140 PID 2704 wrote to memory of 1524 2704 tmp9184.tmp.exe 141 PID 2704 wrote to memory of 1524 2704 tmp9184.tmp.exe 141 PID 2704 wrote to memory of 1524 2704 tmp9184.tmp.exe 141 PID 1524 wrote to memory of 4424 1524 tmp9184.tmp.exe 142 PID 1524 wrote to memory of 4424 1524 tmp9184.tmp.exe 142 PID 1524 wrote to memory of 4424 1524 tmp9184.tmp.exe 142 PID 4424 wrote to memory of 4376 4424 tmp9184.tmp.exe 143 PID 4424 wrote to memory of 4376 4424 tmp9184.tmp.exe 143 PID 4424 wrote to memory of 4376 4424 tmp9184.tmp.exe 143 PID 4376 wrote to memory of 3632 4376 tmp9184.tmp.exe 144 PID 4376 wrote to memory of 3632 4376 tmp9184.tmp.exe 144 PID 4376 wrote to memory of 3632 4376 tmp9184.tmp.exe 144 PID 3632 wrote to memory of 4416 3632 tmp9184.tmp.exe 145 PID 3632 wrote to memory of 4416 3632 tmp9184.tmp.exe 145 PID 3632 wrote to memory of 4416 3632 tmp9184.tmp.exe 145 PID 4416 wrote to memory of 4348 4416 tmp9184.tmp.exe 146 PID 4416 wrote to memory of 4348 4416 tmp9184.tmp.exe 146 PID 4416 wrote to memory of 4348 4416 tmp9184.tmp.exe 146 PID 4348 wrote to memory of 2024 4348 tmp9184.tmp.exe 269 PID 4348 wrote to memory of 2024 4348 tmp9184.tmp.exe 269 PID 4348 wrote to memory of 2024 4348 tmp9184.tmp.exe 269 PID 2024 wrote to memory of 1368 2024 tmp9184.tmp.exe 148 PID 2024 wrote to memory of 1368 2024 tmp9184.tmp.exe 148 PID 2024 wrote to memory of 1368 2024 tmp9184.tmp.exe 148 PID 1368 wrote to memory of 3584 1368 tmp9184.tmp.exe 149 PID 1368 wrote to memory of 3584 1368 tmp9184.tmp.exe 149 PID 1368 wrote to memory of 3584 1368 tmp9184.tmp.exe 149 PID 3584 wrote to memory of 3252 3584 tmp9184.tmp.exe 206 PID 3584 wrote to memory of 3252 3584 tmp9184.tmp.exe 206 PID 3584 wrote to memory of 3252 3584 tmp9184.tmp.exe 206 PID 3252 wrote to memory of 624 3252 tmp9184.tmp.exe 151 PID 3252 wrote to memory of 624 3252 tmp9184.tmp.exe 151 PID 3252 wrote to memory of 624 3252 tmp9184.tmp.exe 151 PID 624 wrote to memory of 228 624 tmp9184.tmp.exe 152 PID 624 wrote to memory of 228 624 tmp9184.tmp.exe 152 PID 624 wrote to memory of 228 624 tmp9184.tmp.exe 152 PID 228 wrote to memory of 2552 228 tmp9184.tmp.exe 211 PID 228 wrote to memory of 2552 228 tmp9184.tmp.exe 211 PID 228 wrote to memory of 2552 228 tmp9184.tmp.exe 211 PID 2552 wrote to memory of 4420 2552 tmp9184.tmp.exe 154 PID 2552 wrote to memory of 4420 2552 tmp9184.tmp.exe 154 PID 2552 wrote to memory of 4420 2552 tmp9184.tmp.exe 154 PID 4420 wrote to memory of 908 4420 tmp9184.tmp.exe 155 PID 4420 wrote to memory of 908 4420 tmp9184.tmp.exe 155 PID 4420 wrote to memory of 908 4420 tmp9184.tmp.exe 155 PID 908 wrote to memory of 4340 908 tmp9184.tmp.exe 156 PID 908 wrote to memory of 4340 908 tmp9184.tmp.exe 156 PID 908 wrote to memory of 4340 908 tmp9184.tmp.exe 156 PID 4340 wrote to memory of 4964 4340 tmp9184.tmp.exe 157 PID 4340 wrote to memory of 4964 4340 tmp9184.tmp.exe 157 PID 4340 wrote to memory of 4964 4340 tmp9184.tmp.exe 157 PID 4964 wrote to memory of 2756 4964 tmp9184.tmp.exe 158 PID 4964 wrote to memory of 2756 4964 tmp9184.tmp.exe 158 PID 4964 wrote to memory of 2756 4964 tmp9184.tmp.exe 158 PID 2756 wrote to memory of 2264 2756 tmp9184.tmp.exe 159 PID 2756 wrote to memory of 2264 2756 tmp9184.tmp.exe 159 PID 2756 wrote to memory of 2264 2756 tmp9184.tmp.exe 159 PID 2264 wrote to memory of 1760 2264 tmp9184.tmp.exe 160 -
System policy modification 1 TTPs 33 IoCs
Processes:
lsass.exebd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exelsass.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe"C:\Users\Admin\AppData\Local\Temp\bd501e7aaaa5408118d4d9ee82fd656b1f43473ad3dfb306f9bd2e5bd061c7ec.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"23⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"24⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"25⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"26⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"27⤵
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"28⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"29⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"30⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"31⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"32⤵
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"33⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"34⤵
- Executes dropped EXE
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"35⤵
- Executes dropped EXE
PID:804 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"36⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"37⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"38⤵
- Executes dropped EXE
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"40⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"41⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"42⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"43⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"44⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"45⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"46⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"47⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"48⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"49⤵
- Executes dropped EXE
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"50⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"51⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"52⤵
- Executes dropped EXE
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"53⤵
- Executes dropped EXE
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"54⤵
- Executes dropped EXE
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"55⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"56⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"57⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"58⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"59⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"60⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"61⤵
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"62⤵
- Executes dropped EXE
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"63⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"64⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"65⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"66⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"67⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"68⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"69⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"70⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"71⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"72⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"73⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"74⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"75⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"76⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"77⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"78⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"79⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"80⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"81⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"82⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"83⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"84⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"85⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"86⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"87⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"88⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"89⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"90⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"91⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"92⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"93⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"94⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"95⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"96⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"97⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"98⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"99⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"100⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"101⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"102⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"103⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"104⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"105⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"106⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"107⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"108⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"109⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"110⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"111⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"112⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"113⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"114⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"115⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"116⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"117⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"118⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"119⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"120⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"121⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9184.tmp.exe"122⤵PID:1196
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-