Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10b4d16a23c4...cd.exe
windows7-x64
10b4d16a23c4...cd.exe
windows10-2004-x64
10b4eca0b762...e1.exe
windows7-x64
1b4eca0b762...e1.exe
windows10-2004-x64
1b4f9f36ada...07.exe
windows7-x64
10b4f9f36ada...07.exe
windows10-2004-x64
10b5002c08a1...bc.exe
windows7-x64
10b5002c08a1...bc.exe
windows10-2004-x64
10b55e92f4a2...a6.exe
windows7-x64
10b55e92f4a2...a6.exe
windows10-2004-x64
10b5687bfac8...82.exe
windows7-x64
10b5687bfac8...82.exe
windows10-2004-x64
10b580ffe62d...98.exe
windows7-x64
7b580ffe62d...98.exe
windows10-2004-x64
7b599b9b1d6...6f.exe
windows7-x64
7b599b9b1d6...6f.exe
windows10-2004-x64
10b5ac1858b7...1a.exe
windows7-x64
5b5ac1858b7...1a.exe
windows10-2004-x64
5b65e1ac2a1...74.exe
windows7-x64
10b65e1ac2a1...74.exe
windows10-2004-x64
10b67576c827...e2.exe
windows7-x64
10b67576c827...e2.exe
windows10-2004-x64
10b68768d198...a8.exe
windows7-x64
7b68768d198...a8.exe
windows10-2004-x64
7b6982d011a...3b.exe
windows7-x64
10b6982d011a...3b.exe
windows10-2004-x64
10b6b7f4db83...cc.exe
windows7-x64
3b6b7f4db83...cc.exe
windows10-2004-x64
3b6baedc86e...7b.exe
windows7-x64
10b6baedc86e...7b.exe
windows10-2004-x64
10b6cd4cbecb...e2.exe
windows7-x64
10b6cd4cbecb...e2.exe
windows10-2004-x64
10Analysis
-
max time kernel
114s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
b4d16a23c4f84119b08271727b504dc277cc03929f4437c01640b9fe610474cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4d16a23c4f84119b08271727b504dc277cc03929f4437c01640b9fe610474cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
b4eca0b7629d60f6cf396e664ca50add98b7376955d993c98d1399bab2da9ae1.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
b4eca0b7629d60f6cf396e664ca50add98b7376955d993c98d1399bab2da9ae1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
b4f9f36ada3d9d3cf8af85679ea3a007.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
b4f9f36ada3d9d3cf8af85679ea3a007.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
b55e92f4a25bac9a1f90a8cf3d7ef9c91d1649598d692eb497d8fed1f20a97a6.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
b55e92f4a25bac9a1f90a8cf3d7ef9c91d1649598d692eb497d8fed1f20a97a6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
b5687bfac89811969dd02dad17352b82.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
b5687bfac89811969dd02dad17352b82.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
b580ffe62d19e702d07e69a2f421a298.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
b580ffe62d19e702d07e69a2f421a298.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
b599b9b1d6311136ef7c416782fdd16f.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
b599b9b1d6311136ef7c416782fdd16f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
b5ac1858b7313eca6ad65f6506620f1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
b5ac1858b7313eca6ad65f6506620f1a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
b65e1ac2a1c32fcf66f67031ebe907e9ca4e1a7cbae7589979b1eba091b6e174.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
b65e1ac2a1c32fcf66f67031ebe907e9ca4e1a7cbae7589979b1eba091b6e174.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
b67576c827f1d682c6863ee2e1b096afb845073be33737653fa7754565634ce2.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
b67576c827f1d682c6863ee2e1b096afb845073be33737653fa7754565634ce2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
b68768d198b634640052e1541b761c4940795292cb1bc0cd4349a7c9d1292da8.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
b68768d198b634640052e1541b761c4940795292cb1bc0cd4349a7c9d1292da8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
b6982d011a327e88728cfc8b6305503b.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
b6982d011a327e88728cfc8b6305503b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
b6b7f4db83367b212cbd15bcfaa2eacc.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
b6b7f4db83367b212cbd15bcfaa2eacc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
b6baedc86ebdd4c9c3cc812f509f777b.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
b6baedc86ebdd4c9c3cc812f509f777b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
b6cd4cbecbd20d06768408f952a13721fb22fdbeca097913deeebe41a41b3ae2.exe
Resource
win7-20240903-en
General
-
Target
b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe
-
Size
351KB
-
MD5
8bb974a955b5fe6ff74c775a1c3c7570
-
SHA1
bece48b62c2932ff93535cbeeb8d8a486e54f486
-
SHA256
b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc
-
SHA512
7b93154b13a7f2c9c568acdeb659817f6fe05ced86eec930725032a9e588e56f6e2e062551586a03c14f57498428cb84e9dfd7ca45fc646b137db8cefc486204
-
SSDEEP
6144:YeC4EwZFoobUk8qp0qpgogZfpjkNaXiCEa4+G:8fhuLwflkaO
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" frjdt4qv.bat -
Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" frjdt4qv.bat Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" frjdt4qv.bat Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" frjdt4qv.bat Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" frjdt4qv.bat -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation frjdt4qv.bat -
Executes dropped EXE 1 IoCs
pid Process 1296 frjdt4qv.bat -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" frjdt4qv.bat -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 api.ipify.org 32 api.ipify.org -
Launches sc.exe 16 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1524 sc.exe 3984 sc.exe 1992 sc.exe 4888 sc.exe 2212 sc.exe 4604 sc.exe 3772 sc.exe 3056 sc.exe 3372 sc.exe 4800 sc.exe 3552 sc.exe 2704 sc.exe 4840 sc.exe 2804 sc.exe 2392 sc.exe 1364 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3728 timeout.exe -
Kills process with taskkill 3 IoCs
pid Process 1272 taskkill.exe 4992 taskkill.exe 3308 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000_Classes\Local Settings b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat 1296 frjdt4qv.bat -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe Token: SeDebugPrivilege 1296 frjdt4qv.bat Token: SeSecurityPrivilege 1476 wevtutil.exe Token: SeBackupPrivilege 1476 wevtutil.exe Token: SeDebugPrivilege 2432 powershell.exe Token: SeDebugPrivilege 3216 powershell.exe Token: SeDebugPrivilege 3308 taskkill.exe Token: SeDebugPrivilege 4992 taskkill.exe Token: SeDebugPrivilege 1272 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 2392 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 136 PID 3976 wrote to memory of 2392 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 136 PID 3976 wrote to memory of 1364 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 88 PID 3976 wrote to memory of 1364 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 88 PID 3976 wrote to memory of 1240 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 93 PID 3976 wrote to memory of 1240 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 93 PID 3976 wrote to memory of 4604 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 95 PID 3976 wrote to memory of 4604 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 95 PID 1240 wrote to memory of 1524 1240 cmd.exe 97 PID 1240 wrote to memory of 1524 1240 cmd.exe 97 PID 3976 wrote to memory of 1296 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 98 PID 3976 wrote to memory of 1296 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 98 PID 3976 wrote to memory of 2124 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 99 PID 3976 wrote to memory of 2124 3976 b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe 99 PID 1296 wrote to memory of 3056 1296 frjdt4qv.bat 101 PID 1296 wrote to memory of 3056 1296 frjdt4qv.bat 101 PID 1296 wrote to memory of 4800 1296 frjdt4qv.bat 103 PID 1296 wrote to memory of 4800 1296 frjdt4qv.bat 103 PID 2124 wrote to memory of 1676 2124 cmd.exe 105 PID 2124 wrote to memory of 1676 2124 cmd.exe 105 PID 2124 wrote to memory of 3324 2124 cmd.exe 106 PID 2124 wrote to memory of 3324 2124 cmd.exe 106 PID 2124 wrote to memory of 3728 2124 cmd.exe 107 PID 2124 wrote to memory of 3728 2124 cmd.exe 107 PID 1296 wrote to memory of 624 1296 frjdt4qv.bat 108 PID 1296 wrote to memory of 624 1296 frjdt4qv.bat 108 PID 1296 wrote to memory of 3984 1296 frjdt4qv.bat 149 PID 1296 wrote to memory of 3984 1296 frjdt4qv.bat 149 PID 624 wrote to memory of 3552 624 cmd.exe 112 PID 624 wrote to memory of 3552 624 cmd.exe 112 PID 1296 wrote to memory of 956 1296 frjdt4qv.bat 114 PID 1296 wrote to memory of 956 1296 frjdt4qv.bat 114 PID 1296 wrote to memory of 4812 1296 frjdt4qv.bat 116 PID 1296 wrote to memory of 4812 1296 frjdt4qv.bat 116 PID 1296 wrote to memory of 1992 1296 frjdt4qv.bat 118 PID 1296 wrote to memory of 1992 1296 frjdt4qv.bat 118 PID 1296 wrote to memory of 3772 1296 frjdt4qv.bat 120 PID 1296 wrote to memory of 3772 1296 frjdt4qv.bat 120 PID 956 wrote to memory of 3372 956 cmd.exe 122 PID 956 wrote to memory of 3372 956 cmd.exe 122 PID 4812 wrote to memory of 4888 4812 cmd.exe 123 PID 4812 wrote to memory of 4888 4812 cmd.exe 123 PID 2124 wrote to memory of 4876 2124 cmd.exe 124 PID 2124 wrote to memory of 4876 2124 cmd.exe 124 PID 2124 wrote to memory of 1476 2124 cmd.exe 125 PID 2124 wrote to memory of 1476 2124 cmd.exe 125 PID 1296 wrote to memory of 1076 1296 frjdt4qv.bat 126 PID 1296 wrote to memory of 1076 1296 frjdt4qv.bat 126 PID 1076 wrote to memory of 2704 1076 cmd.exe 128 PID 1076 wrote to memory of 2704 1076 cmd.exe 128 PID 1296 wrote to memory of 3504 1296 frjdt4qv.bat 132 PID 1296 wrote to memory of 3504 1296 frjdt4qv.bat 132 PID 3504 wrote to memory of 4840 3504 cmd.exe 135 PID 3504 wrote to memory of 4840 3504 cmd.exe 135 PID 1296 wrote to memory of 2432 1296 frjdt4qv.bat 137 PID 1296 wrote to memory of 2432 1296 frjdt4qv.bat 137 PID 1296 wrote to memory of 3216 1296 frjdt4qv.bat 140 PID 1296 wrote to memory of 3216 1296 frjdt4qv.bat 140 PID 1296 wrote to memory of 4188 1296 frjdt4qv.bat 142 PID 1296 wrote to memory of 4188 1296 frjdt4qv.bat 142 PID 1296 wrote to memory of 4548 1296 frjdt4qv.bat 144 PID 1296 wrote to memory of 4548 1296 frjdt4qv.bat 144 PID 4188 wrote to memory of 2212 4188 cmd.exe 146 PID 4188 wrote to memory of 2212 4188 cmd.exe 146 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1676 attrib.exe 4876 attrib.exe 2160 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe"C:\Users\Admin\AppData\Local\Temp\b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe"1⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Checks computer location settings
- Windows security modification
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WerSvc start=disabled2⤵
- Launches sc.exe
PID:2392
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config wdfilter start=disabled2⤵
- Launches sc.exe
PID:1364
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter2⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\sc.exesc stop wdfilter3⤵
- Launches sc.exe
PID:1524
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WinDefend start=disabled2⤵
- Launches sc.exe
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\frjdt4qv.bat"C:\Users\Admin\AppData\Local\Temp\frjdt4qv.bat" ok2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config wdfilter start=disabled3⤵
- Launches sc.exe
PID:3056
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WerSvc start=disabled3⤵
- Launches sc.exe
PID:4800
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter3⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\system32\sc.exesc stop wdfilter4⤵
- Launches sc.exe
PID:3552
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WinDefend start=disabled3⤵
- Launches sc.exe
PID:3984
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WerSvc3⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\sc.exesc stop WerSvc4⤵
- Launches sc.exe
PID:3372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:4888
-
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config WdNisSvc start=disabled3⤵
- Launches sc.exe
PID:1992
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config XblGameSave start=disabled3⤵
- Launches sc.exe
PID:3772
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc3⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\sc.exesc stop WdNisSvc4⤵
- Launches sc.exe
PID:2704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop XblGameSave3⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\system32\sc.exesc stop XblGameSave4⤵
- Launches sc.exe
PID:4840
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "XXXXX" -AppPathNameMatchCondition "C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.exe" -ThrottleRateActionBitsPerSecond 83⤵
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "YYYYY" -AppPathNameMatchCondition "C:\Program Files (x86)\Common Files\BattlEye\BEService.exe" -ThrottleRateActionBitsPerSecond 83⤵
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop wdfilter3⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\sc.exesc stop wdfilter4⤵
- Launches sc.exe
PID:2212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop faceit3⤵PID:4548
-
C:\Windows\system32\sc.exesc stop faceit4⤵
- Launches sc.exe
PID:2804
-
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /T /IM frjdt4qv.bat.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /T /IM frjdt4qv.bat3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /T /IM frjdt4qv3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\df79768d-4b21-416c-80c4-fb0ca525f487.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe"3⤵
- Views/modifies file attributes
PID:1676
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "HiberbootEnabled" /t REG_DWORD /d 0 /f3⤵PID:3324
-
-
C:\Windows\system32\timeout.exetimeout /T 13⤵
- Delays execution with timeout.exe
PID:3728
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\b5002c08a1be3be44a14092d1eb62f69858b5e772df4f86e67339a2250c522bc.exe"3⤵
- Views/modifies file attributes
PID:4876
-
-
C:\Windows\system32\wevtutil.exewevtutil el3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\df79768d-4b21-416c-80c4-fb0ca525f487.bat"3⤵
- Views/modifies file attributes
PID:2160
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:2392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
948B
MD51fa2eebc8c39f3c3452786450319a3b2
SHA1b2d3addd82f457647ee408a1926925039f630ad4
SHA256d21944425332fe535e283990c05b95d7bd19a5368912f86ab1f7d6e2e29c9a33
SHA5127d10b7c2bbcc8402b10570982b263df5b27453a74db03b4b7471cd18d0e02c39a3d09adad15874afdac27dc56594ba318d8430da5546684021e3d0b6af8cbf99
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
776B
MD5308491fcdaeacddcf6340b10363da286
SHA113702312b4e2f25187dee61b97508bd141b7e29f
SHA256714d32f1415da27a5d494f63f921b5dcff3f5a87209d64590c328a086e1d2b42
SHA5124647cc9b39a3ce55a152b5d54a0648b226624c2b88da6a3557604e58f7f021e87c13eb9b0c8273a18322d8c6eb6ec13ecd0edf91409701e0986e4db2e5ee226e
-
Filesize
352KB
MD55d22b4feffd3b02e12ef21c6356b94ab
SHA186215ee08fc306da3616268e08f4a2ad19f34a16
SHA256da8bd5f88c5ed08dd83e6e158f33968210d54f2fbedea91c0bdbfb2c117905c4
SHA51255d07d52950aebc6fb49b54f6c7d78e897008aa028f679ac93ed772f85590ad04a8c44a0dca71e2a25431f575dd2f581b7c13cb7c321f38830fb3b6b8a2ff2b2
-
Filesize
271B
MD5631c2358a02cfc6f57ce67129e9449b6
SHA1aef0940cf23cb70eda531a5a1db11d4c357f4ebe
SHA256e0976f24abb7d6f9cc8ac0c90efd34a4e13ab20486554400efc0e16d4fb42bce
SHA512ef0608648bbbe8f228e0037f46a40c7b6adcaa86199fce534abafdaa176e07439e2f189658a42f4a97b97201352a4d959c0c00c3019a97111069e27a3424ae82