Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe
Resource
win7-20240903-en
General
-
Target
c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe
-
Size
4.9MB
-
MD5
8e81319277a614e4bdedc32b6b547cf1
-
SHA1
0804063c7b3af88bec63b02986c1437e576deede
-
SHA256
c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179
-
SHA512
a0326ac3aecbf5c5b1b237175c3e09f393cf394eea9824faa66680a154c7c8ad574f4ec63307e7f89d90ed1172841c282220fdd049e79991718521819822f2ff
-
SSDEEP
49152:jl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
Colibri family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4828 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3536 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4860 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2064 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 32 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5112 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1180 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4272 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3744 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4736 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3888 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3836 4808 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5068 4808 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe -
resource yara_rule behavioral2/memory/1940-2-0x000000001B820000-0x000000001B94E000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4588 powershell.exe 4604 powershell.exe 4372 powershell.exe 2276 powershell.exe 1660 powershell.exe 1676 powershell.exe 872 powershell.exe 2660 powershell.exe 1552 powershell.exe 968 powershell.exe 2320 powershell.exe -
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dllhost.exe -
Executes dropped EXE 43 IoCs
pid Process 3044 tmp8224.tmp.exe 4676 tmp8224.tmp.exe 3228 dllhost.exe 1884 tmp9B17.tmp.exe 4704 tmp9B17.tmp.exe 4708 tmp9B17.tmp.exe 2420 dllhost.exe 2572 dllhost.exe 3748 tmpE7DF.tmp.exe 3044 tmpE7DF.tmp.exe 4272 dllhost.exe 320 tmp173C.tmp.exe 3544 tmp173C.tmp.exe 3248 dllhost.exe 440 tmp4707.tmp.exe 2028 tmp4707.tmp.exe 3592 dllhost.exe 4644 tmp629D.tmp.exe 4328 tmp629D.tmp.exe 1264 dllhost.exe 2392 tmp7DB7.tmp.exe 1468 tmp7DB7.tmp.exe 3336 dllhost.exe 4864 tmpAD33.tmp.exe 4672 tmpAD33.tmp.exe 3224 dllhost.exe 1396 dllhost.exe 1328 tmpF836.tmp.exe 4696 tmpF836.tmp.exe 4772 tmpF836.tmp.exe 3520 dllhost.exe 3164 tmp28AC.tmp.exe 4372 tmp28AC.tmp.exe 2356 tmp28AC.tmp.exe 4072 dllhost.exe 624 tmp43F5.tmp.exe 5092 tmp43F5.tmp.exe 3672 dllhost.exe 1148 tmp6047.tmp.exe 2320 tmp6047.tmp.exe 4384 dllhost.exe 3560 dllhost.exe 3644 dllhost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 3044 set thread context of 4676 3044 tmp8224.tmp.exe 105 PID 4704 set thread context of 4708 4704 tmp9B17.tmp.exe 136 PID 3748 set thread context of 3044 3748 tmpE7DF.tmp.exe 161 PID 320 set thread context of 3544 320 tmp173C.tmp.exe 174 PID 440 set thread context of 2028 440 tmp4707.tmp.exe 183 PID 4644 set thread context of 4328 4644 tmp629D.tmp.exe 192 PID 2392 set thread context of 1468 2392 tmp7DB7.tmp.exe 203 PID 4864 set thread context of 4672 4864 tmpAD33.tmp.exe 212 PID 4696 set thread context of 4772 4696 tmpF836.tmp.exe 227 PID 4372 set thread context of 2356 4372 tmp28AC.tmp.exe 238 PID 624 set thread context of 5092 624 tmp43F5.tmp.exe 247 PID 1148 set thread context of 2320 1148 tmp6047.tmp.exe 257 -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\RCX7F25.tmp c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\RCX8149.tmp c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File created C:\Program Files (x86)\Windows Sidebar\wininit.exe c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File created C:\Program Files (x86)\Windows Sidebar\56085415360792 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File created C:\Program Files\Microsoft Office 15\ClientX64\5940a34987c991 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\wininit.exe c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\RCX8572.tmp c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\6203df4a6bafc7 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File created C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logs\WindowsUpdate\fontdrvhost.exe c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File created C:\Windows\Logs\WindowsUpdate\5b884080fd4f94 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File opened for modification C:\Windows\Logs\WindowsUpdate\RCX835E.tmp c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe File opened for modification C:\Windows\Logs\WindowsUpdate\fontdrvhost.exe c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp4707.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp629D.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp7DB7.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9B17.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpF836.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpF836.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp28AC.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpE7DF.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp43F5.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp6047.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp173C.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9B17.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAD33.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp28AC.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp8224.tmp.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings dllhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4828 schtasks.exe 32 schtasks.exe 4272 schtasks.exe 2064 schtasks.exe 3888 schtasks.exe 3116 schtasks.exe 1600 schtasks.exe 5112 schtasks.exe 1180 schtasks.exe 3744 schtasks.exe 3836 schtasks.exe 3536 schtasks.exe 4860 schtasks.exe 4904 schtasks.exe 2036 schtasks.exe 2580 schtasks.exe 4736 schtasks.exe 5068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 2276 powershell.exe 2276 powershell.exe 872 powershell.exe 872 powershell.exe 4604 powershell.exe 4604 powershell.exe 1676 powershell.exe 1676 powershell.exe 1552 powershell.exe 1552 powershell.exe 4372 powershell.exe 4372 powershell.exe 1660 powershell.exe 1660 powershell.exe 2660 powershell.exe 2660 powershell.exe 2320 powershell.exe 2320 powershell.exe 1660 powershell.exe 968 powershell.exe 968 powershell.exe 4588 powershell.exe 4588 powershell.exe 2276 powershell.exe 968 powershell.exe 1676 powershell.exe 4604 powershell.exe 872 powershell.exe 2660 powershell.exe 1552 powershell.exe 4372 powershell.exe 2320 powershell.exe 4588 powershell.exe 3228 dllhost.exe 3228 dllhost.exe 2420 dllhost.exe 2572 dllhost.exe 4272 dllhost.exe 3248 dllhost.exe 3592 dllhost.exe 1264 dllhost.exe 3336 dllhost.exe 3224 dllhost.exe 1396 dllhost.exe 3520 dllhost.exe 4072 dllhost.exe 3672 dllhost.exe 4384 dllhost.exe 3560 dllhost.exe 3644 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Token: SeDebugPrivilege 2276 powershell.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeDebugPrivilege 1676 powershell.exe Token: SeDebugPrivilege 1552 powershell.exe Token: SeDebugPrivilege 4372 powershell.exe Token: SeDebugPrivilege 1660 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 968 powershell.exe Token: SeDebugPrivilege 2320 powershell.exe Token: SeDebugPrivilege 4588 powershell.exe Token: SeDebugPrivilege 3228 dllhost.exe Token: SeDebugPrivilege 2420 dllhost.exe Token: SeDebugPrivilege 2572 dllhost.exe Token: SeDebugPrivilege 4272 dllhost.exe Token: SeDebugPrivilege 3248 dllhost.exe Token: SeDebugPrivilege 3592 dllhost.exe Token: SeDebugPrivilege 1264 dllhost.exe Token: SeDebugPrivilege 3336 dllhost.exe Token: SeDebugPrivilege 3224 dllhost.exe Token: SeDebugPrivilege 1396 dllhost.exe Token: SeDebugPrivilege 3520 dllhost.exe Token: SeDebugPrivilege 4072 dllhost.exe Token: SeDebugPrivilege 3672 dllhost.exe Token: SeDebugPrivilege 4384 dllhost.exe Token: SeDebugPrivilege 3560 dllhost.exe Token: SeDebugPrivilege 3644 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3044 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 103 PID 1940 wrote to memory of 3044 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 103 PID 1940 wrote to memory of 3044 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 103 PID 3044 wrote to memory of 4676 3044 tmp8224.tmp.exe 105 PID 3044 wrote to memory of 4676 3044 tmp8224.tmp.exe 105 PID 3044 wrote to memory of 4676 3044 tmp8224.tmp.exe 105 PID 3044 wrote to memory of 4676 3044 tmp8224.tmp.exe 105 PID 3044 wrote to memory of 4676 3044 tmp8224.tmp.exe 105 PID 3044 wrote to memory of 4676 3044 tmp8224.tmp.exe 105 PID 3044 wrote to memory of 4676 3044 tmp8224.tmp.exe 105 PID 1940 wrote to memory of 4588 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 106 PID 1940 wrote to memory of 4588 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 106 PID 1940 wrote to memory of 1660 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 107 PID 1940 wrote to memory of 1660 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 107 PID 1940 wrote to memory of 1676 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 108 PID 1940 wrote to memory of 1676 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 108 PID 1940 wrote to memory of 872 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 109 PID 1940 wrote to memory of 872 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 109 PID 1940 wrote to memory of 4372 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 110 PID 1940 wrote to memory of 4372 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 110 PID 1940 wrote to memory of 4604 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 111 PID 1940 wrote to memory of 4604 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 111 PID 1940 wrote to memory of 2276 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 112 PID 1940 wrote to memory of 2276 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 112 PID 1940 wrote to memory of 2320 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 114 PID 1940 wrote to memory of 2320 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 114 PID 1940 wrote to memory of 968 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 116 PID 1940 wrote to memory of 968 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 116 PID 1940 wrote to memory of 1552 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 117 PID 1940 wrote to memory of 1552 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 117 PID 1940 wrote to memory of 2660 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 119 PID 1940 wrote to memory of 2660 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 119 PID 1940 wrote to memory of 3228 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 128 PID 1940 wrote to memory of 3228 1940 c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe 128 PID 3228 wrote to memory of 4976 3228 dllhost.exe 131 PID 3228 wrote to memory of 4976 3228 dllhost.exe 131 PID 3228 wrote to memory of 4464 3228 dllhost.exe 132 PID 3228 wrote to memory of 4464 3228 dllhost.exe 132 PID 3228 wrote to memory of 1884 3228 dllhost.exe 133 PID 3228 wrote to memory of 1884 3228 dllhost.exe 133 PID 3228 wrote to memory of 1884 3228 dllhost.exe 133 PID 1884 wrote to memory of 4704 1884 tmp9B17.tmp.exe 135 PID 1884 wrote to memory of 4704 1884 tmp9B17.tmp.exe 135 PID 1884 wrote to memory of 4704 1884 tmp9B17.tmp.exe 135 PID 4704 wrote to memory of 4708 4704 tmp9B17.tmp.exe 136 PID 4704 wrote to memory of 4708 4704 tmp9B17.tmp.exe 136 PID 4704 wrote to memory of 4708 4704 tmp9B17.tmp.exe 136 PID 4704 wrote to memory of 4708 4704 tmp9B17.tmp.exe 136 PID 4704 wrote to memory of 4708 4704 tmp9B17.tmp.exe 136 PID 4704 wrote to memory of 4708 4704 tmp9B17.tmp.exe 136 PID 4704 wrote to memory of 4708 4704 tmp9B17.tmp.exe 136 PID 4976 wrote to memory of 2420 4976 WScript.exe 150 PID 4976 wrote to memory of 2420 4976 WScript.exe 150 PID 2420 wrote to memory of 2580 2420 dllhost.exe 152 PID 2420 wrote to memory of 2580 2420 dllhost.exe 152 PID 2420 wrote to memory of 3036 2420 dllhost.exe 153 PID 2420 wrote to memory of 3036 2420 dllhost.exe 153 PID 2580 wrote to memory of 2572 2580 WScript.exe 155 PID 2580 wrote to memory of 2572 2580 WScript.exe 155 PID 2572 wrote to memory of 2944 2572 dllhost.exe 157 PID 2572 wrote to memory of 2944 2572 dllhost.exe 157 PID 2572 wrote to memory of 5076 2572 dllhost.exe 158 PID 2572 wrote to memory of 5076 2572 dllhost.exe 158 PID 2572 wrote to memory of 3748 2572 dllhost.exe 159 -
System policy modification 1 TTPs 51 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dllhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dllhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe"C:\Users\Admin\AppData\Local\Temp\c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\tmp8224.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8224.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\tmp8224.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8224.tmp.exe"3⤵
- Executes dropped EXE
PID:4676
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"2⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3228 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\373f7759-200e-4943-86a9-de22be0d3a63.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"4⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2420 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2939d05b-1dcf-494f-bbac-2df450f778d9.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"6⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2572 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\30e75c5f-453e-42a0-bbbc-b2e7c41e04fc.vbs"7⤵PID:2944
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"8⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4272 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4473ae8a-6728-4df9-958f-c7aa32068e2e.vbs"9⤵PID:4584
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"10⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3248 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\78c5d75c-b2ef-4030-b9b5-2453b3a97561.vbs"11⤵PID:1492
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"12⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3592 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d0cd5d16-3c86-4e3c-8b9e-b7396d1323e4.vbs"13⤵PID:4228
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"14⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1264 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\85ea7885-375a-4124-be67-3e7e08c23c63.vbs"15⤵PID:5016
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"16⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3336 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3a50f144-339b-41b9-8a48-5c69a75ed94f.vbs"17⤵PID:1948
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"18⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3224 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3c039eb4-c325-4f40-87b4-3bf38b9b2e79.vbs"19⤵PID:2040
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"20⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1396 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ba16b336-b7a7-4506-8d75-47d1a6d0b1ba.vbs"21⤵PID:3016
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"22⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3520 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b46853c4-b0ce-4176-a507-e69c78ef33ba.vbs"23⤵PID:4400
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"24⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4072 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1c0c1dea-4867-4f5c-9f31-d6b142b99932.vbs"25⤵PID:3352
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"26⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3672 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\51c25646-efc3-4bbb-a011-ba31c07d6a3a.vbs"27⤵PID:1700
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"28⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4384 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c6ce9789-9062-4a43-8b67-662f74ce9919.vbs"29⤵PID:4684
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"30⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3560 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\87386976-cbc7-42b1-b342-c96432637e3d.vbs"31⤵PID:2088
-
C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe"32⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3644 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7cff8ea1-ed2c-4fe4-ab7b-15d95ed7ff93.vbs"33⤵PID:2044
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d76f9fe8-0cd3-4d1b-b9f5-f8b3b5f20fc9.vbs"33⤵PID:3860
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9ae6c34d-c0d3-4675-9827-a69cf5a99f4f.vbs"31⤵PID:2268
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\13b5b9e3-4e09-4ccf-9b16-2ca0df9e9851.vbs"29⤵PID:3684
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\00fed136-7a11-4752-aeeb-b06c9b0fc5ce.vbs"27⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\tmp6047.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6047.tmp.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\tmp6047.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp6047.tmp.exe"28⤵
- Executes dropped EXE
PID:2320
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ab640c45-5ee2-48dc-8871-2b7824ee15a4.vbs"25⤵PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\tmp43F5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp43F5.tmp.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:624 -
C:\Users\Admin\AppData\Local\Temp\tmp43F5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp43F5.tmp.exe"26⤵
- Executes dropped EXE
PID:5092
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\091d906e-d191-46f2-a07b-1c51ec9653d3.vbs"23⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\tmp28AC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp28AC.tmp.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\tmp28AC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp28AC.tmp.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\tmp28AC.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp28AC.tmp.exe"25⤵
- Executes dropped EXE
PID:2356
-
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3fec6091-0b4d-472a-a625-5e0540feafce.vbs"21⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\tmpF836.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF836.tmp.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\tmpF836.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF836.tmp.exe"22⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\tmpF836.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF836.tmp.exe"23⤵
- Executes dropped EXE
PID:4772
-
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3cc4342a-92ac-4f3a-b684-40dd67886ffb.vbs"19⤵PID:216
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9800016a-b611-4c97-a97d-3e0731e603f6.vbs"17⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\tmpAD33.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAD33.tmp.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\tmpAD33.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAD33.tmp.exe"18⤵
- Executes dropped EXE
PID:4672
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\93fd2beb-e3af-45e5-a263-dd85c62119a0.vbs"15⤵PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7DB7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7DB7.tmp.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\tmp7DB7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp7DB7.tmp.exe"16⤵
- Executes dropped EXE
PID:1468
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d9c823fb-3106-4409-86b9-f060a40d8a3b.vbs"13⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\tmp629D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp629D.tmp.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\tmp629D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp629D.tmp.exe"14⤵
- Executes dropped EXE
PID:4328
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\670d6286-c0af-415e-9244-4491ace40f60.vbs"11⤵PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\tmp4707.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4707.tmp.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:440 -
C:\Users\Admin\AppData\Local\Temp\tmp4707.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4707.tmp.exe"12⤵
- Executes dropped EXE
PID:2028
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e934a8d7-7556-4048-9c35-c9a1f3ca6cac.vbs"9⤵PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\tmp173C.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp173C.tmp.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:320 -
C:\Users\Admin\AppData\Local\Temp\tmp173C.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp173C.tmp.exe"10⤵
- Executes dropped EXE
PID:3544
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ace30773-d3b1-4322-8bb8-d59f24cdbdb8.vbs"7⤵PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\tmpE7DF.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE7DF.tmp.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\tmpE7DF.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE7DF.tmp.exe"8⤵
- Executes dropped EXE
PID:3044
-
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9a280ff6-420d-4d71-860e-277a48fcf6ba.vbs"5⤵PID:3036
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\af2f4dfa-cca3-455d-8003-97b932385e2e.vbs"3⤵PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9B17.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9B17.tmp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\tmp9B17.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9B17.tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\tmp9B17.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9B17.tmp.exe"5⤵
- Executes dropped EXE
PID:4708
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Sidebar\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:32
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Windows\Logs\WindowsUpdate\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Logs\WindowsUpdate\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 9 /tr "'C:\Windows\Logs\WindowsUpdate\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179c" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179" /sc ONLOGON /tr "'C:\Users\All Users\c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179c" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5068
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD58e81319277a614e4bdedc32b6b547cf1
SHA10804063c7b3af88bec63b02986c1437e576deede
SHA256c70cd9f4166ce251a72ae7c176630f6deb17b1dd74854769a381102e77a35179
SHA512a0326ac3aecbf5c5b1b237175c3e09f393cf394eea9824faa66680a154c7c8ad574f4ec63307e7f89d90ed1172841c282220fdd049e79991718521819822f2ff
-
Filesize
1KB
MD54a667f150a4d1d02f53a9f24d89d53d1
SHA1306e125c9edce66f28fdb63e6c4ca5c9ad6e8c97
SHA256414659decfd237dde09625a49811e03b5b30ee06ee2ee97ea8bcfac394d281fd
SHA5124edd8e73ce03488a6d92750a782cd4042fbb54a5b3f8d8ba3ea227fda0653c2cd84f0c5d64976c7cdc1f518a2fdc8ff10e2a015ec7acf3cd01b0d62bc98542d8
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
Filesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
Filesize
734B
MD5a8e24ceceba79cf9096bf5d9a70d7842
SHA1015b4d948076ccb387fcbfe015119e88c489e26e
SHA25675a24318cabb3795ff6ed43f4f01bf9804dbece733eecbda5770a333a0acde04
SHA5126b5c2f7f3aaab3150f8152a0bd950a318934c1f865e72d33d69c0cf9ae2220e1093af6b8bf3a7f81dc243eca600a8da6066722fb02be5ece30db9d2acb79b38e
-
Filesize
734B
MD5fc959bbbe7677b9dcd4d6e31ea34a534
SHA162af37c0a5796930ce1eba3a8db453d8c60d290b
SHA2567e0272db3244dbfa478bcdc81b1c012a5e267ea9d18fbef1fc8c5673ab7e7df8
SHA5123df018b50f2d7fa715bc30203873357d48889db6fe14558b36fe0f7833401b57ec30f9290010fdf4cc0086e9fa89f7a79af995ad8863bbe8e868632a91b47648
-
Filesize
734B
MD58efb56334f34ee3255591155e4696c16
SHA1dbbae3a0955267ebbcee96acefad96a69adf7aa7
SHA2564aa2afd78fd0a78acd866cf46cec128d2dd9c530c75d162d18032c7280d666c2
SHA512386be5d9f4b7c071e937ee1263d8ffdc5d4c341edbb8d92d66ee9fa7fcfa175d4b1334446c40b19d92688a02e6485e25503214f05367d159d447ec48abf0c7b4
-
Filesize
734B
MD5fd886c6be28a555c24edb05d8738b078
SHA12d31a67d10cbe88bdc98d95d4d2fbfa5096024d2
SHA2562e85343802b5f6ad455590e7d6cb083e7d7d597dac929a23b4ec010563acf099
SHA51298183d64ea66c1a04b51b628917c19b76e64ea73935487bd76bd26537c8d80e14b535637a20363465bdd69e54d595cb99760c65e674739aa84d4e46235d3b444
-
Filesize
734B
MD51bf4470d188163ffd84acf752af54b92
SHA1d63b10c770dc9cd7c05b6005c7f50fed3aa39724
SHA2568b177b4543b8b623dfa75f0cf47bf14609cd70566194223d03ecfffd7bd5df18
SHA512f45abcf2b731a9b125fe769d2ac88e3e627a0fd07ef3b793feb00cc86cdae4843b18f6533f55b556bec905a8bfe489049404770fc0b14ffe548b30ddaac0dda6
-
Filesize
734B
MD51a1234dcc1639342057c98b8c0d67216
SHA11067c5c55c400f9d3b4717cda614307dd9ebbb9e
SHA256b4c6d12ed681214441949325b5f7d4e254f96df7018e751708cfaf59485eded2
SHA512497d5cd03b137418792132f9f0bca2946841ae6553695820084b26176e5810306feb55e5ad95d7d36254f3d07b222378e45190853ef7f3290fdbef30b60b78ec
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
510B
MD5e7976d7542028df3fe555713bb1a627b
SHA1c5744ae5a07cd6fb62fd9e7e6c0f0d4911c2ddb0
SHA256abe3d34d0dec8a8e19a33315607590af7f30aea668dbdbcf8947ac48fa08eb94
SHA51293712e87c1ccc94150f9fc291c9002af24bebc15659db241aa4a9981da297392b9d8dbcf3227e2d086a6f7fe5b9e31477349d486c2e383fb7c4e547e145ec1bb
-
Filesize
734B
MD56085d99abc66cd48985d2ba27ef97327
SHA181ebd543c34639ee7a9a37ff31ccdb5750f8ca6a
SHA256918f3e300471ff2b03db1382e5738aa3c6892ec6147933ff5095051928ef4409
SHA512a0a5742123fc77eeeb9b7081e2938a4f8f9dfd5fb6d3c3b4bd243b32bef4d1c6fc9553a64612d419ea6d9c4f1afac270c049d0caa316398bc3f0d52de7a5759f
-
Filesize
75KB
MD5e0a68b98992c1699876f818a22b5b907
SHA1d41e8ad8ba51217eb0340f8f69629ccb474484d0
SHA2562b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f
SHA512856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2