Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
106465e923bf...61.exe
windows7-x64
106465e923bf...61.exe
windows10-2004-x64
106677fcb62e...50.exe
windows7-x64
36677fcb62e...50.exe
windows10-2004-x64
3691d9802fa...e9.exe
windows7-x64
1691d9802fa...e9.exe
windows10-2004-x64
16a150e7eee...36.exe
windows7-x64
86a150e7eee...36.exe
windows10-2004-x64
86aa340437e...c2.exe
windows7-x64
106aa340437e...c2.exe
windows10-2004-x64
106c5bf2ea45...8f.exe
windows7-x64
106c5bf2ea45...8f.exe
windows10-2004-x64
106e40e3ab02...99.exe
windows7-x64
6e40e3ab02...99.exe
windows10-2004-x64
6f2c23f7e9...78.exe
windows7-x64
76f2c23f7e9...78.exe
windows10-2004-x64
7788cfdaeb7...ed.exe
windows7-x64
7788cfdaeb7...ed.exe
windows10-2004-x64
77cfc40d94f...f2.exe
windows7-x64
37cfc40d94f...f2.exe
windows10-2004-x64
37f237484f5...1d.exe
windows7-x64
17f237484f5...1d.exe
windows10-2004-x64
17f8bcaf3c1...5d.exe
windows7-x64
107f8bcaf3c1...5d.exe
windows10-2004-x64
10863385d41f...34.exe
windows7-x64
10863385d41f...34.exe
windows10-2004-x64
1089c11885c2...31.exe
windows7-x64
1089c11885c2...31.exe
windows10-2004-x64
108abccfea53...41.exe
windows7-x64
18abccfea53...41.exe
windows10-2004-x64
18ea7566ef3...44.exe
windows7-x64
108ea7566ef3...44.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
6465e923bf241700a250f531b63fc650c66e97c5affa1f70a0aa6a75bf63b561.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6465e923bf241700a250f531b63fc650c66e97c5affa1f70a0aa6a75bf63b561.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
6677fcb62e94c51701129d45bf8b4fe7fc3c570c60a95e67939c4c2830e9d250.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
6677fcb62e94c51701129d45bf8b4fe7fc3c570c60a95e67939c4c2830e9d250.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
691d9802facb4880b056112b035368f77f5f23a56c59a895ae5d1f5182ddbce9.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
691d9802facb4880b056112b035368f77f5f23a56c59a895ae5d1f5182ddbce9.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
6a150e7eee969746cc6cc4579d13d2fd6cef5bdc77223aa24e9a6c1c6bf7b036.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
6a150e7eee969746cc6cc4579d13d2fd6cef5bdc77223aa24e9a6c1c6bf7b036.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
6c5bf2ea45920850b041a5a75288570d464ce6c27da4f16c5f25106089985f8f.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
6c5bf2ea45920850b041a5a75288570d464ce6c27da4f16c5f25106089985f8f.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
6e40e3ab026935212a686af172ed8403d196cfaf350b91915ac31a33d81b3799.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
6e40e3ab026935212a686af172ed8403d196cfaf350b91915ac31a33d81b3799.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
6f2c23f7e99a6712509c9f30f9ce3dcd9ea2bfd6ea020ed3b8dcb3641bd34478.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
6f2c23f7e99a6712509c9f30f9ce3dcd9ea2bfd6ea020ed3b8dcb3641bd34478.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
788cfdaeb7e97e9b24de3cb416d2f88a373d4813a0d362902731f54f519ad3ed.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
788cfdaeb7e97e9b24de3cb416d2f88a373d4813a0d362902731f54f519ad3ed.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
7cfc40d94f3ffc3a8c3c8824f031dcbb07d673cfa1fc7dd6ed02e3ca01c326f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
7cfc40d94f3ffc3a8c3c8824f031dcbb07d673cfa1fc7dd6ed02e3ca01c326f2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
7f237484f5bd1786c2c4eceb85b121443a11f98e62273da8a2b4835ab6c1971d.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7f237484f5bd1786c2c4eceb85b121443a11f98e62273da8a2b4835ab6c1971d.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
7f8bcaf3c125b12f6b8cc4cd98bfe089b433753bed821414b1fcf6b958b1935d.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
7f8bcaf3c125b12f6b8cc4cd98bfe089b433753bed821414b1fcf6b958b1935d.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
863385d41fea84d79d3ded4aec09ae9a6d71ce80f16ebfef20752f65e4ac5834.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
89c11885c24f281671cc737a808764a62e128a0dad890ae6d444d14d682e2631.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
89c11885c24f281671cc737a808764a62e128a0dad890ae6d444d14d682e2631.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
8abccfea539da5a03d784ff60d88d128a3f901e9a9ae51ddb3caf0e05e192341.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
8abccfea539da5a03d784ff60d88d128a3f901e9a9ae51ddb3caf0e05e192341.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
8ea7566ef322ea6fec4ec75f7aed5fd8dad6adceab78f6ea5b557ef925b6a644.exe
Resource
win7-20240903-en
General
-
Target
6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe
-
Size
377KB
-
MD5
c12a252c4eb0b2b8a0f58e40a61657af
-
SHA1
5f5d1232d72e8e7e483f384e6d0190641220f840
-
SHA256
6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2
-
SHA512
8b2ec810876eb98f1a9ba1f6bf8a40e838e2830fbe0f4f23599461adec057676a38efbf6924a655cdb26264f9fd4e3b4c0b40dd8877c66a1ba57fe2b54493c4f
-
SSDEEP
6144:/Ukp93F9P7YZ79m74rprzQ2Fl5lkV7nfFhvD+gnrkvF:/Uk73v7YZxm7ypDlTkV7nvdkv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation EofbViOjFpRS7hffLQht17dTG.exe -
Executes dropped EXE 1 IoCs
pid Process 3876 EofbViOjFpRS7hffLQht17dTG.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yi6joqUAg7OgBVikeHphsRKKG = "C:\\Windows\\system32\\n0OUC3BcrHzDMVyBPrplO7fOy\\EofbViOjFpRS7hffLQht17dTG.exe" 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe File opened for modification C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 848 timeout.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 1192 ipconfig.exe 4184 ipconfig.exe 4188 ipconfig.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 388 schtasks.exe 3636 schtasks.exe 2668 schtasks.exe 2612 schtasks.exe 1016 schtasks.exe 2568 schtasks.exe 3544 schtasks.exe 1716 schtasks.exe 1936 schtasks.exe 3444 schtasks.exe 848 schtasks.exe 4980 schtasks.exe 1284 schtasks.exe 1436 schtasks.exe 8 schtasks.exe 2860 schtasks.exe 4340 schtasks.exe 1952 schtasks.exe 4428 schtasks.exe 1424 schtasks.exe 2540 schtasks.exe 1244 schtasks.exe 4588 schtasks.exe 4420 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3876 EofbViOjFpRS7hffLQht17dTG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3316 powershell.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe Token: SeDebugPrivilege 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe Token: SeDebugPrivilege 3316 powershell.exe Token: SeBackupPrivilege 1168 vssvc.exe Token: SeRestorePrivilege 1168 vssvc.exe Token: SeAuditPrivilege 1168 vssvc.exe Token: SeDebugPrivilege 3876 EofbViOjFpRS7hffLQht17dTG.exe Token: SeDebugPrivilege 3876 EofbViOjFpRS7hffLQht17dTG.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 3108 wrote to memory of 1192 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 86 PID 3108 wrote to memory of 1192 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 86 PID 3108 wrote to memory of 3316 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 89 PID 3108 wrote to memory of 3316 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 89 PID 3108 wrote to memory of 2860 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 97 PID 3108 wrote to memory of 2860 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 97 PID 3108 wrote to memory of 3876 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 99 PID 3108 wrote to memory of 3876 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 99 PID 3108 wrote to memory of 4584 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 100 PID 3108 wrote to memory of 4584 3108 6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe 100 PID 4584 wrote to memory of 848 4584 cmd.exe 102 PID 4584 wrote to memory of 848 4584 cmd.exe 102 PID 3876 wrote to memory of 4184 3876 EofbViOjFpRS7hffLQht17dTG.exe 103 PID 3876 wrote to memory of 4184 3876 EofbViOjFpRS7hffLQht17dTG.exe 103 PID 3876 wrote to memory of 4188 3876 EofbViOjFpRS7hffLQht17dTG.exe 106 PID 3876 wrote to memory of 4188 3876 EofbViOjFpRS7hffLQht17dTG.exe 106 PID 3876 wrote to memory of 2540 3876 EofbViOjFpRS7hffLQht17dTG.exe 111 PID 3876 wrote to memory of 2540 3876 EofbViOjFpRS7hffLQht17dTG.exe 111 PID 3876 wrote to memory of 1244 3876 EofbViOjFpRS7hffLQht17dTG.exe 113 PID 3876 wrote to memory of 1244 3876 EofbViOjFpRS7hffLQht17dTG.exe 113 PID 3876 wrote to memory of 1716 3876 EofbViOjFpRS7hffLQht17dTG.exe 115 PID 3876 wrote to memory of 1716 3876 EofbViOjFpRS7hffLQht17dTG.exe 115 PID 3876 wrote to memory of 4340 3876 EofbViOjFpRS7hffLQht17dTG.exe 118 PID 3876 wrote to memory of 4340 3876 EofbViOjFpRS7hffLQht17dTG.exe 118 PID 3876 wrote to memory of 4588 3876 EofbViOjFpRS7hffLQht17dTG.exe 124 PID 3876 wrote to memory of 4588 3876 EofbViOjFpRS7hffLQht17dTG.exe 124 PID 3876 wrote to memory of 1936 3876 EofbViOjFpRS7hffLQht17dTG.exe 126 PID 3876 wrote to memory of 1936 3876 EofbViOjFpRS7hffLQht17dTG.exe 126 PID 3876 wrote to memory of 3444 3876 EofbViOjFpRS7hffLQht17dTG.exe 132 PID 3876 wrote to memory of 3444 3876 EofbViOjFpRS7hffLQht17dTG.exe 132 PID 3876 wrote to memory of 1952 3876 EofbViOjFpRS7hffLQht17dTG.exe 134 PID 3876 wrote to memory of 1952 3876 EofbViOjFpRS7hffLQht17dTG.exe 134 PID 3876 wrote to memory of 388 3876 EofbViOjFpRS7hffLQht17dTG.exe 136 PID 3876 wrote to memory of 388 3876 EofbViOjFpRS7hffLQht17dTG.exe 136 PID 3876 wrote to memory of 3636 3876 EofbViOjFpRS7hffLQht17dTG.exe 138 PID 3876 wrote to memory of 3636 3876 EofbViOjFpRS7hffLQht17dTG.exe 138 PID 3876 wrote to memory of 4428 3876 EofbViOjFpRS7hffLQht17dTG.exe 140 PID 3876 wrote to memory of 4428 3876 EofbViOjFpRS7hffLQht17dTG.exe 140 PID 3876 wrote to memory of 4420 3876 EofbViOjFpRS7hffLQht17dTG.exe 143 PID 3876 wrote to memory of 4420 3876 EofbViOjFpRS7hffLQht17dTG.exe 143 PID 3876 wrote to memory of 848 3876 EofbViOjFpRS7hffLQht17dTG.exe 145 PID 3876 wrote to memory of 848 3876 EofbViOjFpRS7hffLQht17dTG.exe 145 PID 3876 wrote to memory of 2668 3876 EofbViOjFpRS7hffLQht17dTG.exe 147 PID 3876 wrote to memory of 2668 3876 EofbViOjFpRS7hffLQht17dTG.exe 147 PID 3876 wrote to memory of 2612 3876 EofbViOjFpRS7hffLQht17dTG.exe 149 PID 3876 wrote to memory of 2612 3876 EofbViOjFpRS7hffLQht17dTG.exe 149 PID 3876 wrote to memory of 1016 3876 EofbViOjFpRS7hffLQht17dTG.exe 151 PID 3876 wrote to memory of 1016 3876 EofbViOjFpRS7hffLQht17dTG.exe 151 PID 3876 wrote to memory of 2568 3876 EofbViOjFpRS7hffLQht17dTG.exe 153 PID 3876 wrote to memory of 2568 3876 EofbViOjFpRS7hffLQht17dTG.exe 153 PID 3876 wrote to memory of 4980 3876 EofbViOjFpRS7hffLQht17dTG.exe 155 PID 3876 wrote to memory of 4980 3876 EofbViOjFpRS7hffLQht17dTG.exe 155 PID 3876 wrote to memory of 1424 3876 EofbViOjFpRS7hffLQht17dTG.exe 157 PID 3876 wrote to memory of 1424 3876 EofbViOjFpRS7hffLQht17dTG.exe 157 PID 3876 wrote to memory of 1284 3876 EofbViOjFpRS7hffLQht17dTG.exe 159 PID 3876 wrote to memory of 1284 3876 EofbViOjFpRS7hffLQht17dTG.exe 159 PID 3876 wrote to memory of 1436 3876 EofbViOjFpRS7hffLQht17dTG.exe 161 PID 3876 wrote to memory of 1436 3876 EofbViOjFpRS7hffLQht17dTG.exe 161 PID 3876 wrote to memory of 3544 3876 EofbViOjFpRS7hffLQht17dTG.exe 163 PID 3876 wrote to memory of 3544 3876 EofbViOjFpRS7hffLQht17dTG.exe 163 PID 3876 wrote to memory of 8 3876 EofbViOjFpRS7hffLQht17dTG.exe 165 PID 3876 wrote to memory of 8 3876 EofbViOjFpRS7hffLQht17dTG.exe 165 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe"C:\Users\Admin\AppData\Local\Temp\6aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2.exe"1⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Disables RegEdit via registry modification
- Checks computer location settings
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\System32\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release2⤵
- Gathers network information
PID:1192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:08 /du 23:59 /sc daily /ri 1 /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2860
-
-
C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe"C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\System32\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /release3⤵
- Gathers network information
PID:4184
-
-
C:\Windows\System32\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /renew3⤵
- Gathers network information
PID:4188
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:08 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2540
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:08 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1244
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:08 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1716
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:08 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4340
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:08 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4588
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1936
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3444
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1952
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:388
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3636
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4428
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4420
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:848
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2668
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:09 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2612
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:10 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1016
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:10 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2568
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:10 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4980
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:10 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1424
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:10 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1284
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:10 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1436
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:10 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3544
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn Yi6joqUAg7OgBVikeHphsRKKG /tr "C:\Windows\system32\n0OUC3BcrHzDMVyBPrplO7fOy\EofbViOjFpRS7hffLQht17dTG.exe" /st 08:10 /du 23:59 /sc daily /ri 1 /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:8
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB5B3.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\system32\timeout.exetimeout 63⤵
- Delays execution with timeout.exe
PID:848
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1168
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
216B
MD50d097a616d7848a23eaaa3d627d4ed13
SHA13417ac916d199afdb3a5f0f19acff410a9080fdf
SHA256203922bcbc7a891242f345b9bd0578698ea7382b62a2b9d01ea094264ae55d34
SHA5122d4b1076c4e72784143c4aa858d472cb4f1a5da37f7d254aa985884516b429bc51c44833e0269f43377746fb671dc59155d2f46112fca489ac2d458f5f341633
-
Filesize
377KB
MD5c12a252c4eb0b2b8a0f58e40a61657af
SHA15f5d1232d72e8e7e483f384e6d0190641220f840
SHA2566aa340437e5bb3c895cbef7775c0694b2fa44692f995e85a64dca6e8f0e250c2
SHA5128b2ec810876eb98f1a9ba1f6bf8a40e838e2830fbe0f4f23599461adec057676a38efbf6924a655cdb26264f9fd4e3b4c0b40dd8877c66a1ba57fe2b54493c4f