Overview
overview
10Static
static
10fe25de503f...5a.exe
windows7-x64
10fe25de503f...5a.exe
windows10-2004-x64
10fe282eaa90...45.exe
windows7-x64
10fe282eaa90...45.exe
windows10-2004-x64
10fe402f76d3...4d.exe
windows7-x64
10fe402f76d3...4d.exe
windows10-2004-x64
10fe55574c53...c0.exe
windows7-x64
1fe55574c53...c0.exe
windows10-2004-x64
5fe8a65a43d...3f.exe
windows7-x64
7fe8a65a43d...3f.exe
windows10-2004-x64
7fe99ddfdfc...6c.exe
windows7-x64
10fe99ddfdfc...6c.exe
windows10-2004-x64
10feb2c82a66...50.exe
windows7-x64
10feb2c82a66...50.exe
windows10-2004-x64
10fef2b831e5...91.exe
windows7-x64
8fef2b831e5...91.exe
windows10-2004-x64
8ff03c0c01a...cd.exe
windows7-x64
7ff03c0c01a...cd.exe
windows10-2004-x64
10ff1699c2d9...5a.exe
windows7-x64
10ff1699c2d9...5a.exe
windows10-2004-x64
10ff573ccb26...dd.exe
windows7-x64
10ff573ccb26...dd.exe
windows10-2004-x64
10ff5eef1816...3f.exe
windows7-x64
10ff5eef1816...3f.exe
windows10-2004-x64
10ff9b69031d...c2.exe
windows7-x64
10ff9b69031d...c2.exe
windows10-2004-x64
10ffc0421dee...0b.exe
windows7-x64
10ffc0421dee...0b.exe
windows10-2004-x64
7ffc45f2c58...73.exe
windows7-x64
10ffc45f2c58...73.exe
windows10-2004-x64
10fffa7ee6ec...91.exe
windows7-x64
10fffa7ee6ec...91.exe
windows10-2004-x64
10Analysis
-
max time kernel
139s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:18
Behavioral task
behavioral1
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
fffa7ee6ec076412930605bd55bbc491.exe
Resource
win7-20240903-en
General
-
Target
ff5eef1816b5037715c6da38464a8a3f.exe
-
Size
1.1MB
-
MD5
ff5eef1816b5037715c6da38464a8a3f
-
SHA1
ba123a98299528f73ad8cbfa234d3fd9a78c47f5
-
SHA256
66495902f22ee35be8d28b76ed4bee1a60e9b39bbddba2118e8dcac14ed24104
-
SHA512
daa099d8a747e563a7371500abba63f9c1746eb6916d233949b20e99ab11408caac85e49638e3f5d14757180c53477ec1d9bf99f99d99636c17aa819d62d802c
-
SSDEEP
12288:Kmc4TfAkdN7TPPl2Eh8Nv6L1FMCubuoGTeh46qTnnCPQeB89hNuD1hOp1i3l10gR:Kh4TbLUEhZL/GspeYhkc9Soh2SfwJ
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\audiodg.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\audiodg.exe\", \"C:\\Documents and Settings\\Idle.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\", \"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\audiodg.exe\", \"C:\\Documents and Settings\\Idle.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft .NET Framework 4.7.2 Setup_20241010_084439937\\ff5eef1816b5037715c6da38464a8a3f.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe -
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 2672 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2672 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1252 2672 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1936 2672 schtasks.exe 30 -
UAC bypass 3 TTPs 36 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ff5eef1816b5037715c6da38464a8a3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ff5eef1816b5037715c6da38464a8a3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ff5eef1816b5037715c6da38464a8a3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1052 powershell.exe 2936 powershell.exe 2312 powershell.exe 2680 powershell.exe 520 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts ff5eef1816b5037715c6da38464a8a3f.exe -
Executes dropped EXE 11 IoCs
pid Process 1908 audiodg.exe 556 audiodg.exe 2656 audiodg.exe 2500 audiodg.exe 572 audiodg.exe 2244 audiodg.exe 324 audiodg.exe 2664 audiodg.exe 1048 audiodg.exe 2512 audiodg.exe 1116 audiodg.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Documents and Settings\\Idle.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\Documents and Settings\\Idle.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ff5eef1816b5037715c6da38464a8a3f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft .NET Framework 4.7.2 Setup_20241010_084439937\\ff5eef1816b5037715c6da38464a8a3f.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ff5eef1816b5037715c6da38464a8a3f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft .NET Framework 4.7.2 Setup_20241010_084439937\\ff5eef1816b5037715c6da38464a8a3f.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\audiodg.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files (x86)\\Microsoft Synchronization Services\\ADO.NET\\audiodg.exe\"" ff5eef1816b5037715c6da38464a8a3f.exe -
Checks whether UAC is enabled 1 TTPs 24 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ff5eef1816b5037715c6da38464a8a3f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ff5eef1816b5037715c6da38464a8a3f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe ff5eef1816b5037715c6da38464a8a3f.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\42af1c969fbb7b ff5eef1816b5037715c6da38464a8a3f.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\RCX6CD9.tmp ff5eef1816b5037715c6da38464a8a3f.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe ff5eef1816b5037715c6da38464a8a3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe 2324 schtasks.exe 1252 schtasks.exe 1936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2312 powershell.exe 2484 ff5eef1816b5037715c6da38464a8a3f.exe 2936 powershell.exe 2680 powershell.exe 520 powershell.exe 1052 powershell.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe 1908 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2484 ff5eef1816b5037715c6da38464a8a3f.exe Token: SeDebugPrivilege 2312 powershell.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 520 powershell.exe Token: SeDebugPrivilege 1908 audiodg.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeDebugPrivilege 556 audiodg.exe Token: SeDebugPrivilege 2656 audiodg.exe Token: SeDebugPrivilege 2500 audiodg.exe Token: SeDebugPrivilege 572 audiodg.exe Token: SeDebugPrivilege 2244 audiodg.exe Token: SeDebugPrivilege 324 audiodg.exe Token: SeDebugPrivilege 2664 audiodg.exe Token: SeDebugPrivilege 1048 audiodg.exe Token: SeDebugPrivilege 2512 audiodg.exe Token: SeDebugPrivilege 1116 audiodg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2312 2484 ff5eef1816b5037715c6da38464a8a3f.exe 35 PID 2484 wrote to memory of 2312 2484 ff5eef1816b5037715c6da38464a8a3f.exe 35 PID 2484 wrote to memory of 2312 2484 ff5eef1816b5037715c6da38464a8a3f.exe 35 PID 2484 wrote to memory of 2936 2484 ff5eef1816b5037715c6da38464a8a3f.exe 36 PID 2484 wrote to memory of 2936 2484 ff5eef1816b5037715c6da38464a8a3f.exe 36 PID 2484 wrote to memory of 2936 2484 ff5eef1816b5037715c6da38464a8a3f.exe 36 PID 2484 wrote to memory of 1052 2484 ff5eef1816b5037715c6da38464a8a3f.exe 37 PID 2484 wrote to memory of 1052 2484 ff5eef1816b5037715c6da38464a8a3f.exe 37 PID 2484 wrote to memory of 1052 2484 ff5eef1816b5037715c6da38464a8a3f.exe 37 PID 2484 wrote to memory of 520 2484 ff5eef1816b5037715c6da38464a8a3f.exe 38 PID 2484 wrote to memory of 520 2484 ff5eef1816b5037715c6da38464a8a3f.exe 38 PID 2484 wrote to memory of 520 2484 ff5eef1816b5037715c6da38464a8a3f.exe 38 PID 2484 wrote to memory of 2680 2484 ff5eef1816b5037715c6da38464a8a3f.exe 39 PID 2484 wrote to memory of 2680 2484 ff5eef1816b5037715c6da38464a8a3f.exe 39 PID 2484 wrote to memory of 2680 2484 ff5eef1816b5037715c6da38464a8a3f.exe 39 PID 2484 wrote to memory of 1908 2484 ff5eef1816b5037715c6da38464a8a3f.exe 45 PID 2484 wrote to memory of 1908 2484 ff5eef1816b5037715c6da38464a8a3f.exe 45 PID 2484 wrote to memory of 1908 2484 ff5eef1816b5037715c6da38464a8a3f.exe 45 PID 1908 wrote to memory of 2168 1908 audiodg.exe 46 PID 1908 wrote to memory of 2168 1908 audiodg.exe 46 PID 1908 wrote to memory of 2168 1908 audiodg.exe 46 PID 1908 wrote to memory of 1476 1908 audiodg.exe 47 PID 1908 wrote to memory of 1476 1908 audiodg.exe 47 PID 1908 wrote to memory of 1476 1908 audiodg.exe 47 PID 2168 wrote to memory of 556 2168 WScript.exe 48 PID 2168 wrote to memory of 556 2168 WScript.exe 48 PID 2168 wrote to memory of 556 2168 WScript.exe 48 PID 556 wrote to memory of 1732 556 audiodg.exe 49 PID 556 wrote to memory of 1732 556 audiodg.exe 49 PID 556 wrote to memory of 1732 556 audiodg.exe 49 PID 556 wrote to memory of 1940 556 audiodg.exe 50 PID 556 wrote to memory of 1940 556 audiodg.exe 50 PID 556 wrote to memory of 1940 556 audiodg.exe 50 PID 1732 wrote to memory of 2656 1732 WScript.exe 51 PID 1732 wrote to memory of 2656 1732 WScript.exe 51 PID 1732 wrote to memory of 2656 1732 WScript.exe 51 PID 2656 wrote to memory of 2276 2656 audiodg.exe 52 PID 2656 wrote to memory of 2276 2656 audiodg.exe 52 PID 2656 wrote to memory of 2276 2656 audiodg.exe 52 PID 2656 wrote to memory of 3016 2656 audiodg.exe 53 PID 2656 wrote to memory of 3016 2656 audiodg.exe 53 PID 2656 wrote to memory of 3016 2656 audiodg.exe 53 PID 2276 wrote to memory of 2500 2276 WScript.exe 54 PID 2276 wrote to memory of 2500 2276 WScript.exe 54 PID 2276 wrote to memory of 2500 2276 WScript.exe 54 PID 2500 wrote to memory of 2512 2500 audiodg.exe 55 PID 2500 wrote to memory of 2512 2500 audiodg.exe 55 PID 2500 wrote to memory of 2512 2500 audiodg.exe 55 PID 2500 wrote to memory of 820 2500 audiodg.exe 56 PID 2500 wrote to memory of 820 2500 audiodg.exe 56 PID 2500 wrote to memory of 820 2500 audiodg.exe 56 PID 2512 wrote to memory of 572 2512 WScript.exe 57 PID 2512 wrote to memory of 572 2512 WScript.exe 57 PID 2512 wrote to memory of 572 2512 WScript.exe 57 PID 572 wrote to memory of 2012 572 audiodg.exe 58 PID 572 wrote to memory of 2012 572 audiodg.exe 58 PID 572 wrote to memory of 2012 572 audiodg.exe 58 PID 572 wrote to memory of 2104 572 audiodg.exe 59 PID 572 wrote to memory of 2104 572 audiodg.exe 59 PID 572 wrote to memory of 2104 572 audiodg.exe 59 PID 2012 wrote to memory of 2244 2012 WScript.exe 61 PID 2012 wrote to memory of 2244 2012 WScript.exe 61 PID 2012 wrote to memory of 2244 2012 WScript.exe 61 PID 2244 wrote to memory of 1992 2244 audiodg.exe 62 -
System policy modification 1 TTPs 36 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ff5eef1816b5037715c6da38464a8a3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ff5eef1816b5037715c6da38464a8a3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ff5eef1816b5037715c6da38464a8a3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" audiodg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" audiodg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff5eef1816b5037715c6da38464a8a3f.exe"C:\Users\Admin\AppData\Local\Temp\ff5eef1816b5037715c6da38464a8a3f.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Drops file in Drivers directory
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2484 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ff5eef1816b5037715c6da38464a8a3f.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Documents and Settings\Idle.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20241010_084439937\ff5eef1816b5037715c6da38464a8a3f.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1908 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\def2fd03-a2ff-4c8e-be9c-767ff5059b5c.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:556 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\70d50787-4727-486b-8c8b-b7a2fdbfc4c2.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"6⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2656 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\90829c2f-a4d1-4e54-b288-b23bf85e9ba9.vbs"7⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"8⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2500 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0eb6f784-f62a-4363-b821-21e1dd1b3b88.vbs"9⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"10⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:572 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6562bbc4-1224-4199-9101-53fd3aea6c03.vbs"11⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"12⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2244 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\bcf9f4aa-246f-41e4-babb-eb16d811e827.vbs"13⤵PID:1992
-
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"14⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:324 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\caebbcba-e84d-43c9-8b91-8f3b9a3e16b3.vbs"15⤵PID:2324
-
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"16⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2664 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6b1b5d0c-777a-481d-9c4f-f9562b7132a4.vbs"17⤵PID:2152
-
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"18⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1048 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d090ea2c-7896-47bc-a4a2-bff781df7ee1.vbs"19⤵PID:2468
-
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"20⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2512 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e9787b59-d4e0-4354-bc0a-aba9605c6188.vbs"21⤵PID:1028
-
C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe"22⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1116 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4a21cec3-9d7d-410e-b90d-5b5a8ca18c6c.vbs"23⤵PID:1552
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8e050a51-0290-4072-bb54-3b16462523d5.vbs"23⤵PID:2520
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c534fb63-500b-4200-a4ab-db8c90101c2f.vbs"21⤵PID:2336
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\9e850c51-11f9-48e2-8814-8102b3246be0.vbs"19⤵PID:2568
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\30ad6b1c-fcf8-4b73-9ecd-d93363dd9d9e.vbs"17⤵PID:2296
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b5b7d03f-ce65-46d9-8ca2-496fe75c076c.vbs"15⤵PID:3024
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ac288822-d5fa-4ab1-9af5-95dcb03899bf.vbs"13⤵PID:1808
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c6361b27-070f-47f8-951a-15799bbb0897.vbs"11⤵PID:2104
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f4f6ea4f-febc-4ef0-9682-fd5c5008b6f4.vbs"9⤵PID:820
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1c6f4a60-26ff-41d0-a1a1-857b36971ed3.vbs"7⤵PID:3016
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5627b044-b64b-4b22-9f04-af0744a22952.vbs"5⤵PID:1940
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\827ac3d0-2958-4b9d-937a-178047459e85.vbs"3⤵PID:1476
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Documents and Settings\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ff5eef1816b5037715c6da38464a8a3f" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20241010_084439937\ff5eef1816b5037715c6da38464a8a3f.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1252
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5ff5eef1816b5037715c6da38464a8a3f
SHA1ba123a98299528f73ad8cbfa234d3fd9a78c47f5
SHA25666495902f22ee35be8d28b76ed4bee1a60e9b39bbddba2118e8dcac14ed24104
SHA512daa099d8a747e563a7371500abba63f9c1746eb6916d233949b20e99ab11408caac85e49638e3f5d14757180c53477ec1d9bf99f99d99636c17aa819d62d802c
-
Filesize
753B
MD5b54259426511e0aaf70818326588795b
SHA16039d369a2c472751fd172e0213e24fd14dc70ac
SHA256b387623b393d2ca9034bbc3baca69528e78dbb61d0cbb2b6f8cf7e9d0c9cf36f
SHA512552a2053746792c75b75728270bacb71c6796eea8c8689aba9fd26af7e8ff5ba1576020e449b3203afc0cc92af5baa8e141c5daeed9a8a46e1f9e73f60dea44d
-
Filesize
753B
MD59eac0e4420c60b553bd14f564b17f1aa
SHA1aea8f961ac21584ff67fe99ebedaed6275d116af
SHA25697371f86e131e84b353963d5394c29195fc59cacf9fb8f7e59949a798018dbfb
SHA5127e4abda426b4f1bf2bf75f869b27ef2c517847dfa840f7769aac37d1933d4d0ef286bb37bbf72e1f1db2608c3728dc957ef04c4493a97d9701fe19cfb0910c8e
-
Filesize
752B
MD546a36aa77f0246970b43f7fec664412d
SHA18c31eca79260c9b24c07a62798801f0137807f0e
SHA2569f6c3a6944ed37210bc4ad883d9093ef47bb7618f73ccf9a3f102d0c2e1cbc74
SHA51207889cfd6fcfa841bad343fe1223ec482572f99fe6dc36287640f3070f4aadfa0344f17934c42c889c035fe8eda2c1f45faa12f580a661f7095dadb576dd838b
-
Filesize
753B
MD59688241257450422aee1e9cea9c78018
SHA1b8e29e385595a2f82f74a87d34081c5c644ec895
SHA256cd3aa476832a55c9fb6ef68d5b9801d5d6a710cb48b6ad0727dcb1a91f7c3a1d
SHA512a41f56313d3cd33905ba40aba8544c76852276d67f2675566d00a2b0f809de69c7fe09bf47c3f3a3d28b7b937a74d3aa48599bd956f805f3df5086db03f45469
-
Filesize
752B
MD54926c762b7869b4c48fecce8674e47ef
SHA1cafda7516dc41fadfc59b27020e6cd901e0f8323
SHA25642f4eb69f64a032fd55d9a96f21a25a7fda5b430ff80c3db8c751ca74cad4b5a
SHA512f206227b42914b4567a34311e2876cf360ceb2657fcd93dc13e3f87ed7d80af0296d50da384a6c9cbf04a8a51aef1cbf924d2f323d053f4600dd898db4b7f58f
-
Filesize
529B
MD569bbeb41b7ebb21accdd3a89852d8b0d
SHA191554d56750f4b053b2e759f939271cbd6f31eb9
SHA256cb2b5b055f88902b6b7852c93cb7f789dae05cd348aa28284756b60117ecfac8
SHA512348b0e594cc03b75ed568a2dda11e50105c163f5790848aaa8a5cdb71bc3692a5e6c136cdc86927e3b20a41ae82a309dcf9e90514a88bd1fee8874b4bac6872d
-
Filesize
753B
MD58855e3d6217afb895d07f3d5abc05e43
SHA16b84b1484d8b45005d537d358ecfab70c839a37c
SHA256d5e7e6329f11bc2be4a4919af4fdc44b72ee38acd5f0611603f41db26bcc9591
SHA5125fbf9ce80641f516cb4f6e4471cd59dbd7858d93d2b10dc0de3fb9cb9ee299ab3254a21d9d941566bedb8e051adaa676c3806d906e21f991a10d9c3325cfb08b
-
Filesize
753B
MD5535e7173eb64249bf74b7edb5c3d1d47
SHA14f538f0b0bf2714526c742d9ba2ef8d0323c9073
SHA256c2d17d1e7818739ade0ef5a60fd27461d64acd0561c78cb528ba837089976351
SHA512af05f197cb76d69703bbe272de383f542fc2f1e794a685760c10f83be98a50da6035cb90eb5d7b567651b411e1614353b276fc513eed2a1dff913b85aba82b3f
-
Filesize
752B
MD5e7092d3b2493d028e161df25432846a7
SHA1e76ef2ba1e4d3e858a2246b35d1d99e06f341102
SHA256bd7cc74e74efb6a344295363b491e0cc936053e1b3ed1f42affce9909db00593
SHA51203ac2c2430fbf9e7425239e6f259e5dadef78da01370326622d956542f7e2d7edb0aa2a10a68ae85f48b5dd4e3cc75f6f009e8b415f54057312a17db052fd10b
-
Filesize
753B
MD5e1d92446dd787852801ce21160dc23c6
SHA18a66b3264bc3f93eeb88c9797305aea691e768c9
SHA25668fc282b0a4014044be042687c62b6727cb2d96b043f373c6c4f4c50db29174b
SHA5128be48531bd2541a98bca912b1e73798e1f4f1ed80a0fdbfa83a1473de773cd3467fb54ef16d47ef84373fab11997b5a524ade1fc862e25fcae3b16fb85a872bd
-
Filesize
753B
MD579362e88b52de89b651fc094735964b8
SHA154b798740438cdfadbb8808c66428cc28d515a34
SHA2565cd1d3fe516df5509a9d1ca121aa3dd272f0962d35d262f8496c6ce0c048c58d
SHA51204e232217deb18471d568226e8feec138e5014ec0cdca951f7356a415e46b10f8451b3d5a38c94979503c8605ffbf1cee0db0f3e8027db8095273b29814be7e3
-
Filesize
753B
MD559e7be39b53ff556975341009ea097ac
SHA1c384cb5ac81b968b82821bbc75f9f4d7dba25ac9
SHA2565b2d3cb1a93d733f0da831462de44c4c991ad883e1f81577de337625968f2d15
SHA5126e10838dc54bd47837875ec5a8d6a40151d83297da806213dd2df684384f1eca30b9c6d1fdbf52b97e7e53aa4983e0a6b78bd1f9053bf2d8a8c0ea027184960b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ac8ff9a9467a59b84c2bd2c361ec9ea4
SHA14d17b6492aba77ff9c5409fe328ba48508b9c94f
SHA256e017b03e99be918f3e462ce66be2f2797f994c50459bb83cc54ba0e75a3ce39a
SHA512b5e2260aafb6fa3247f820004e5f4fd3774177ee9d45a0ac7bc9330fe222bbc0e55e313bcf4fa590ff763e78b7cd5ac4fd49bcfa72e32c27544c620c96c5d29e