Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10192f0f1221...a0.exe
windows7-x64
10192f0f1221...a0.exe
windows10-2004-x64
10193e069cb0...e1.exe
windows7-x64
10193e069cb0...e1.exe
windows10-2004-x64
10196a171e0e...b9.exe
windows7-x64
10196a171e0e...b9.exe
windows10-2004-x64
10197a511efa...32.exe
windows7-x64
8197a511efa...32.exe
windows10-2004-x64
819ec0ef7b7...c4.exe
windows7-x64
1019ec0ef7b7...c4.exe
windows10-2004-x64
101a4ae15ef3...a3.exe
windows7-x64
101a4ae15ef3...a3.exe
windows10-2004-x64
101a76abc85d...f9.exe
windows7-x64
61a76abc85d...f9.exe
windows10-2004-x64
61a9cd1714a...bf.exe
windows7-x64
101a9cd1714a...bf.exe
windows10-2004-x64
101b06c73e9c...af.exe
windows7-x64
101b06c73e9c...af.exe
windows10-2004-x64
101b0acebe24...06.exe
windows7-x64
101b0acebe24...06.exe
windows10-2004-x64
101b64ed84e0...ca.exe
windows7-x64
101b64ed84e0...ca.exe
windows10-2004-x64
101b7c2cbdf7...fc.exe
windows7-x64
101b7c2cbdf7...fc.exe
windows10-2004-x64
101bb302f6b2...b3.exe
windows7-x64
101bb302f6b2...b3.exe
windows10-2004-x64
101bbf7d818b...fd.exe
windows7-x64
101bbf7d818b...fd.exe
windows10-2004-x64
101be2b92cea...ae.exe
windows7-x64
101be2b92cea...ae.exe
windows10-2004-x64
101c2345047a...a0.exe
windows7-x64
101c2345047a...a0.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:17
Behavioral task
behavioral1
Sample
192f0f1221e376146e725a4d23ee69a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
192f0f1221e376146e725a4d23ee69a0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
193e069cb0734f2f4107d4c1fbb7f3b22d8783932eaa405bb7a0e52cb86fcfe1.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
193e069cb0734f2f4107d4c1fbb7f3b22d8783932eaa405bb7a0e52cb86fcfe1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
196a171e0e93d86ea0a2e62e57df3214202969dfdc4a3d635f228fe0a53565b9.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
196a171e0e93d86ea0a2e62e57df3214202969dfdc4a3d635f228fe0a53565b9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
197a511efac9c171f1a50077e9ae4a32.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
197a511efac9c171f1a50077e9ae4a32.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
19ec0ef7b7ce9c5d9d5a2c9ee955a5c4.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
19ec0ef7b7ce9c5d9d5a2c9ee955a5c4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
1a4ae15ef300f51f70607edc1e8e62a3.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
1a4ae15ef300f51f70607edc1e8e62a3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
1a76abc85db21c92e847aa3562aab0b09c56bdce383b54b6957b78314d4429f9.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
1a76abc85db21c92e847aa3562aab0b09c56bdce383b54b6957b78314d4429f9.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral15
Sample
1a9cd1714a3e518cfd51f84f1be819bf.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
1a9cd1714a3e518cfd51f84f1be819bf.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
1b06c73e9c03f55f8fe3c26f374a889e7095d080c3448d4d040db1ebf46f6aaf.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
1b06c73e9c03f55f8fe3c26f374a889e7095d080c3448d4d040db1ebf46f6aaf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
1b0acebe24bf7a0fa1e25e0e9174184ad9827298b7ff75384049deed6e74c306.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
1b0acebe24bf7a0fa1e25e0e9174184ad9827298b7ff75384049deed6e74c306.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
1b64ed84e05604e07552ae57fe9f150e3ca6c2da17c4b4e3bef01d5d023d1bca.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
1b64ed84e05604e07552ae57fe9f150e3ca6c2da17c4b4e3bef01d5d023d1bca.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
1b7c2cbdf74b50ca0c081bd3404b8054bd85c6e0ab7b65f5863d2dd3d2fc9cfc.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
1b7c2cbdf74b50ca0c081bd3404b8054bd85c6e0ab7b65f5863d2dd3d2fc9cfc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
1bb302f6b26022b9f405c4a06c165b236837688e94ea312a231c8f780e63d2b3.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
1bb302f6b26022b9f405c4a06c165b236837688e94ea312a231c8f780e63d2b3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
1bbf7d818b40f8fa0da224e39f27829bb7d8a8bdbec66fa62cfba39cd0d6d3fd.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
1bbf7d818b40f8fa0da224e39f27829bb7d8a8bdbec66fa62cfba39cd0d6d3fd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
1be2b92ceabc55905ef2d5a4d28e28f80931887ca1b7aa2557775e09402d36ae.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
1be2b92ceabc55905ef2d5a4d28e28f80931887ca1b7aa2557775e09402d36ae.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
1c2345047abfb5daed017769f13254053b7c8cfe14027982065835c6a4bc9aa0.exe
Resource
win7-20250207-en
General
-
Target
192f0f1221e376146e725a4d23ee69a0.exe
-
Size
1.9MB
-
MD5
192f0f1221e376146e725a4d23ee69a0
-
SHA1
9500b9672eac1b1b2dee0e81f8b8efbb6d0d90ff
-
SHA256
019443010d028a6d5828afc530b1bd568e536afe32e715fe6a771f3ee1a3cc9d
-
SHA512
daab36e062d27fd7a62607eb16a6013523fafabb31618e681feeae2fc92eb93d43c1f1a8051849aee4839d8b025ccf7227f5081847fd7b2c78e6f233f8d25a54
-
SSDEEP
24576:kz4T3bMX0/0ZqSEaa3OVFu8VQTo8Ia29MSVyAXmFPf87ptY60/YYhdbh7JRj:kOMX0/08SVYTcxMXPxthD
Malware Config
Signatures
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1572 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5752 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3148 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4508 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5004 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4972 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4988 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4136 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5040 4968 schtasks.exe 90 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4548 4968 schtasks.exe 90 -
UAC bypass 3 TTPs 30 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 192f0f1221e376146e725a4d23ee69a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 192f0f1221e376146e725a4d23ee69a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 192f0f1221e376146e725a4d23ee69a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3996 powershell.exe 5936 powershell.exe 4028 powershell.exe 3896 powershell.exe 1580 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 192f0f1221e376146e725a4d23ee69a0.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation 192f0f1221e376146e725a4d23ee69a0.exe Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe -
Executes dropped EXE 9 IoCs
pid Process 4424 RuntimeBroker.exe 5016 RuntimeBroker.exe 1996 RuntimeBroker.exe 1688 RuntimeBroker.exe 4796 RuntimeBroker.exe 4844 RuntimeBroker.exe 2644 RuntimeBroker.exe 3964 RuntimeBroker.exe 4112 RuntimeBroker.exe -
Checks whether UAC is enabled 1 TTPs 20 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 192f0f1221e376146e725a4d23ee69a0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 192f0f1221e376146e725a4d23ee69a0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe 192f0f1221e376146e725a4d23ee69a0.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe 192f0f1221e376146e725a4d23ee69a0.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\9e8d7a4ca61bd9 192f0f1221e376146e725a4d23ee69a0.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\RCX5940.tmp 192f0f1221e376146e725a4d23ee69a0.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe 192f0f1221e376146e725a4d23ee69a0.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\RCX5DC8.tmp 192f0f1221e376146e725a4d23ee69a0.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe 192f0f1221e376146e725a4d23ee69a0.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\7a0fd90576e088 192f0f1221e376146e725a4d23ee69a0.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\RCX5941.tmp 192f0f1221e376146e725a4d23ee69a0.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\RCX5E46.tmp 192f0f1221e376146e725a4d23ee69a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 192f0f1221e376146e725a4d23ee69a0.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings RuntimeBroker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4988 schtasks.exe 4888 schtasks.exe 4972 schtasks.exe 4136 schtasks.exe 5040 schtasks.exe 4548 schtasks.exe 1572 schtasks.exe 5752 schtasks.exe 2828 schtasks.exe 3148 schtasks.exe 4508 schtasks.exe 5004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2832 192f0f1221e376146e725a4d23ee69a0.exe 2832 192f0f1221e376146e725a4d23ee69a0.exe 2832 192f0f1221e376146e725a4d23ee69a0.exe 2832 192f0f1221e376146e725a4d23ee69a0.exe 2832 192f0f1221e376146e725a4d23ee69a0.exe 2832 192f0f1221e376146e725a4d23ee69a0.exe 2832 192f0f1221e376146e725a4d23ee69a0.exe 1580 powershell.exe 1580 powershell.exe 4028 powershell.exe 4028 powershell.exe 3996 powershell.exe 3996 powershell.exe 3896 powershell.exe 3896 powershell.exe 5936 powershell.exe 5936 powershell.exe 3896 powershell.exe 4028 powershell.exe 1580 powershell.exe 3996 powershell.exe 5936 powershell.exe 4424 RuntimeBroker.exe 5016 RuntimeBroker.exe 1996 RuntimeBroker.exe 1688 RuntimeBroker.exe 1688 RuntimeBroker.exe 4796 RuntimeBroker.exe 4844 RuntimeBroker.exe 2644 RuntimeBroker.exe 3964 RuntimeBroker.exe 4112 RuntimeBroker.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2832 192f0f1221e376146e725a4d23ee69a0.exe Token: SeDebugPrivilege 1580 powershell.exe Token: SeDebugPrivilege 4028 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeDebugPrivilege 5936 powershell.exe Token: SeDebugPrivilege 4424 RuntimeBroker.exe Token: SeDebugPrivilege 5016 RuntimeBroker.exe Token: SeDebugPrivilege 1996 RuntimeBroker.exe Token: SeDebugPrivilege 1688 RuntimeBroker.exe Token: SeDebugPrivilege 4796 RuntimeBroker.exe Token: SeDebugPrivilege 4844 RuntimeBroker.exe Token: SeDebugPrivilege 2644 RuntimeBroker.exe Token: SeDebugPrivilege 3964 RuntimeBroker.exe Token: SeDebugPrivilege 4112 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2832 wrote to memory of 1580 2832 192f0f1221e376146e725a4d23ee69a0.exe 108 PID 2832 wrote to memory of 1580 2832 192f0f1221e376146e725a4d23ee69a0.exe 108 PID 2832 wrote to memory of 3896 2832 192f0f1221e376146e725a4d23ee69a0.exe 109 PID 2832 wrote to memory of 3896 2832 192f0f1221e376146e725a4d23ee69a0.exe 109 PID 2832 wrote to memory of 4028 2832 192f0f1221e376146e725a4d23ee69a0.exe 110 PID 2832 wrote to memory of 4028 2832 192f0f1221e376146e725a4d23ee69a0.exe 110 PID 2832 wrote to memory of 5936 2832 192f0f1221e376146e725a4d23ee69a0.exe 112 PID 2832 wrote to memory of 5936 2832 192f0f1221e376146e725a4d23ee69a0.exe 112 PID 2832 wrote to memory of 3996 2832 192f0f1221e376146e725a4d23ee69a0.exe 113 PID 2832 wrote to memory of 3996 2832 192f0f1221e376146e725a4d23ee69a0.exe 113 PID 2832 wrote to memory of 4424 2832 192f0f1221e376146e725a4d23ee69a0.exe 118 PID 2832 wrote to memory of 4424 2832 192f0f1221e376146e725a4d23ee69a0.exe 118 PID 4424 wrote to memory of 2300 4424 RuntimeBroker.exe 122 PID 4424 wrote to memory of 2300 4424 RuntimeBroker.exe 122 PID 4424 wrote to memory of 5740 4424 RuntimeBroker.exe 123 PID 4424 wrote to memory of 5740 4424 RuntimeBroker.exe 123 PID 2300 wrote to memory of 5016 2300 WScript.exe 128 PID 2300 wrote to memory of 5016 2300 WScript.exe 128 PID 5016 wrote to memory of 4908 5016 RuntimeBroker.exe 130 PID 5016 wrote to memory of 4908 5016 RuntimeBroker.exe 130 PID 5016 wrote to memory of 4700 5016 RuntimeBroker.exe 131 PID 5016 wrote to memory of 4700 5016 RuntimeBroker.exe 131 PID 4908 wrote to memory of 1996 4908 WScript.exe 135 PID 4908 wrote to memory of 1996 4908 WScript.exe 135 PID 1996 wrote to memory of 648 1996 RuntimeBroker.exe 137 PID 1996 wrote to memory of 648 1996 RuntimeBroker.exe 137 PID 1996 wrote to memory of 1544 1996 RuntimeBroker.exe 138 PID 1996 wrote to memory of 1544 1996 RuntimeBroker.exe 138 PID 648 wrote to memory of 1688 648 WScript.exe 142 PID 648 wrote to memory of 1688 648 WScript.exe 142 PID 1688 wrote to memory of 5112 1688 RuntimeBroker.exe 144 PID 1688 wrote to memory of 5112 1688 RuntimeBroker.exe 144 PID 1688 wrote to memory of 3276 1688 RuntimeBroker.exe 145 PID 1688 wrote to memory of 3276 1688 RuntimeBroker.exe 145 PID 5112 wrote to memory of 4796 5112 WScript.exe 147 PID 5112 wrote to memory of 4796 5112 WScript.exe 147 PID 4796 wrote to memory of 4412 4796 RuntimeBroker.exe 149 PID 4796 wrote to memory of 4412 4796 RuntimeBroker.exe 149 PID 4796 wrote to memory of 5292 4796 RuntimeBroker.exe 150 PID 4796 wrote to memory of 5292 4796 RuntimeBroker.exe 150 PID 4412 wrote to memory of 4844 4412 WScript.exe 154 PID 4412 wrote to memory of 4844 4412 WScript.exe 154 PID 4844 wrote to memory of 3720 4844 RuntimeBroker.exe 156 PID 4844 wrote to memory of 3720 4844 RuntimeBroker.exe 156 PID 4844 wrote to memory of 3548 4844 RuntimeBroker.exe 157 PID 4844 wrote to memory of 3548 4844 RuntimeBroker.exe 157 PID 3720 wrote to memory of 2644 3720 WScript.exe 159 PID 3720 wrote to memory of 2644 3720 WScript.exe 159 PID 2644 wrote to memory of 6044 2644 RuntimeBroker.exe 161 PID 2644 wrote to memory of 6044 2644 RuntimeBroker.exe 161 PID 2644 wrote to memory of 3900 2644 RuntimeBroker.exe 162 PID 2644 wrote to memory of 3900 2644 RuntimeBroker.exe 162 PID 6044 wrote to memory of 3964 6044 WScript.exe 163 PID 6044 wrote to memory of 3964 6044 WScript.exe 163 PID 3964 wrote to memory of 2532 3964 RuntimeBroker.exe 165 PID 3964 wrote to memory of 2532 3964 RuntimeBroker.exe 165 PID 3964 wrote to memory of 4196 3964 RuntimeBroker.exe 166 PID 3964 wrote to memory of 4196 3964 RuntimeBroker.exe 166 PID 2532 wrote to memory of 4112 2532 WScript.exe 167 PID 2532 wrote to memory of 4112 2532 WScript.exe 167 PID 4112 wrote to memory of 5044 4112 RuntimeBroker.exe 169 PID 4112 wrote to memory of 5044 4112 RuntimeBroker.exe 169 PID 4112 wrote to memory of 2964 4112 RuntimeBroker.exe 170 PID 4112 wrote to memory of 2964 4112 RuntimeBroker.exe 170 -
System policy modification 1 TTPs 30 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 192f0f1221e376146e725a4d23ee69a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 192f0f1221e376146e725a4d23ee69a0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 192f0f1221e376146e725a4d23ee69a0.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\192f0f1221e376146e725a4d23ee69a0.exe"C:\Users\Admin\AppData\Local\Temp\192f0f1221e376146e725a4d23ee69a0.exe"1⤵
- UAC bypass
- Drops file in Drivers directory
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\192f0f1221e376146e725a4d23ee69a0.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\2f3e0199fccb3f72e8a39924edc6a781\fontdrvhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Documents\sysmon.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"2⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4424 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0b6ae157-8b64-43cb-ac10-a948f173177f.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"4⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5016 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\eb7bcdea-7451-4191-97bb-7b63583916a8.vbs"5⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"6⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1996 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\75d8afdd-eb20-4e77-b784-b85e7f9732e7.vbs"7⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"8⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1688 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\adae97e0-5685-40c2-a067-5084cdafa210.vbs"9⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"10⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4796 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b0b4b5c5-dbff-4607-8e87-0383aaa9a4e4.vbs"11⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"12⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4844 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6700d9fb-c70e-4df5-802b-0a60dde3a10d.vbs"13⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"14⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2644 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b2aa43f5-8e59-4c2f-a2c1-f6e1860f8773.vbs"15⤵
- Suspicious use of WriteProcessMemory
PID:6044 -
C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"16⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3964 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\58d4f751-9ef0-4884-911e-d5bcc125af2c.vbs"17⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe"18⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4112 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1789c539-d417-4967-a27b-2073ad42ae17.vbs"19⤵PID:5044
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\59b708f5-8b3b-4a9d-812e-f8fab493c2ab.vbs"19⤵PID:2964
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\30476efc-f3f6-4980-8ce8-6a01e7edc179.vbs"17⤵PID:4196
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\02ae8190-d26a-46e1-b614-1d5a1cceb15e.vbs"15⤵PID:3900
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2010a383-8cfa-4199-ac9e-39e244c1c1de.vbs"13⤵PID:3548
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cbbca99c-bd07-4012-ab91-e0547f958ba5.vbs"11⤵PID:5292
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6791963a-f45c-4765-beb6-e7982de27768.vbs"9⤵PID:3276
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\11a04fb8-89e2-47d7-8e08-bbf933b6c666.vbs"7⤵PID:1544
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a76d9b01-68ad-4456-a1a4-00c1be7279e6.vbs"5⤵PID:4700
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\986d70b7-8c75-4058-9f1f-4cf43ce0a349.vbs"3⤵PID:5740
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\2f3e0199fccb3f72e8a39924edc6a781\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\ja-JP\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Documents\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Users\Default\Documents\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Documents\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\de-DE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4988
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b7894080a21eb5a3bce7689afbb0522f
SHA1e4b1e9b8c5457b36927b850a1efd2a13c47357de
SHA256a639a90c71371f8ea6c9caf3a8f8ac932bd5e94ebbd8a94ba80bb7646862130b
SHA512dbd9c611da30593733a8cf7a030c0a56a53b1050811cdfd22d0a2d5754b9212a3a09994e12617e9918b7e08784dbc4105bdacf67cec7ef7d96f3b4f56db79f3e
-
Filesize
1KB
MD5364147c1feef3565925ea5b4ac701a01
SHA19a46393ac3ffad3bb3c8f0e074b65d68d75e21ef
SHA25638cf1ab1146ad24e88763fc0508c2a99478d8428b453ba8c8b830d2883a4562b
SHA512bfec1d3f22abd5668def189259deb4d919ceb4d51ac965d0baf9b6cf8bea0db680d49a2b8d0b75524cc04c7803cdfd91e484b31dc8ddc3ff47d1e5c59a9e35cf
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5084d49c16a0db5a169356315e8e97d83
SHA1af662c8666ef7c52c9711c0f143e0b8620f27d19
SHA256a374d799d8b4b9c2cac922c093a90cbaf6d0bda3155faf176c6f95b46b8f35d2
SHA512c14524f55f0e58bb64a99298b82d995136a0057c2a7e4e972b9c90477871ae416063318ba8b7f43a4fc66ca8b21eca26505645c4d195fe3ab9419c8d35a459fb
-
Filesize
944B
MD5842369b08704bbddf9de4d90016e58dd
SHA18bc3da656c08abbc14c58201e65b0dc823964bea
SHA256cbf20404c609c0792de4320ac3fa1806269cf5d97420565e3f43d409a11a2808
SHA5128f6cc3419f04b1cb4e6c7986ad9fb8a43fb380fee263937e223d8a5269aec918c2c8cd362ee708de0ded3a533f4cd43624d606f45b37e128bec52ada30c43b42
-
Filesize
944B
MD5ffb4808be0aaa918b807bb4dd4f5e080
SHA18895ae463a633e1201ed09468acc86e1e57a838b
SHA25626fb93195d69045c08c9720cd9291fec8cb24fe49f5dd2604c26d6873f41c3b2
SHA5127370e92e6c097ee52ef4d3e3b9ccbf482bbd3603bb25355c84c4c1599c94c8d0d4edc230d7db1ab8dd4d34c40afec839187fa5db46d48c58802e9e3107414ed9
-
Filesize
743B
MD593e69e1ff8482f031b35d40d2ef71303
SHA1d77127acce0290e180676f139fcaf8335af765b2
SHA2569081711b1675f592ace8cdf863fc0d8ee9b611a7f0ff3844914846277f62a8d2
SHA51244eb6228484aeed97f6d96cc4f94e046adb2ddd129b2145fa71e1d834a8d3a6640b2b6c73af0f18da1344ebe06e22fce19524a9b3a825bf39d3e0a8addec0e23
-
Filesize
743B
MD5b7ecc58b7f6d397feb464dd173641da7
SHA1a4bb906602e86f8df5d5f8efdcfbc00fc4bd1505
SHA2566a55cf218a931fa5c0553f356211aa3c5e61d5f9e1f4717401f22fee98d65a87
SHA512209b2d9aba98c6db84e41019aee110a3e0aee085ed21c40a0647c6f86a7d4a2073ef929636221569cea72aaf70f27783d3a9fe2bff71772a94ee9e2ed2c1e05d
-
Filesize
743B
MD50a2e3215745ff4c5b946949b2fe2fbf4
SHA14aea9d97e32f82ec670a9e9e02b1e20ee2f1c627
SHA256cd3e08e48e2030fa770869ddbce520198a001e47895c79f069b1f65269606977
SHA51294fd68ff0f253697264141ea0039eb9e6b86940eb8f1d20c2c1c73fbe6e74baac474f7d4163eccbc90ff7b0e4f7d69909adee3aa4cfffcde3a93227d5a884ec2
-
Filesize
743B
MD5b8739458d1e32adb250fb571d618a0e8
SHA1aec28b21fc530f20e364f63597e282bdf7820b25
SHA256b348155d09610b0027d2af8ced9f13d674076e6bc57e5bb8fb1170cf2d684be0
SHA51277ca8c26988b44941023083784b069a089c48067bdcac8c0868f331e7b3daa917e164f6ac7e2cc83492739515f895153d97289503528aec56b7eeb2926189664
-
Filesize
743B
MD5ee37f0cb0dffd9aa549a48dc18ac09ec
SHA1604645fe606098e8163aba99dda3870b3b02daa0
SHA25659283d2cba9109742391c88ce249e395bda4a76121e900b3a8b87f923c9203a2
SHA51237134845e7c5c3b49e4db2cea5b99beeb1c1fc4fd1a3d5cd5daf521833507707ec6d08e272d75048bc5224a37538824bbcd6c8b43c851a283eea74403d4053ee
-
Filesize
1.9MB
MD5192f0f1221e376146e725a4d23ee69a0
SHA19500b9672eac1b1b2dee0e81f8b8efbb6d0d90ff
SHA256019443010d028a6d5828afc530b1bd568e536afe32e715fe6a771f3ee1a3cc9d
SHA512daab36e062d27fd7a62607eb16a6013523fafabb31618e681feeae2fc92eb93d43c1f1a8051849aee4839d8b025ccf7227f5081847fd7b2c78e6f233f8d25a54
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
519B
MD570001a75882477b11b14ead821e0041c
SHA1bc61badbf3c0b0e20506b7205db00040035fcbce
SHA2560163fece010a4d0cfd72d263786e1f7dafa903dd8bb4dcb190f88da1d7e2f2ef
SHA5129b02297879ffb5b5c5ed99ce87d9bb4e10d18c12c0da25bc6a4d799b3e827d9274bc7d6e6bf2a10112dab6adfcca47fd1933efc9ca8a751d2b30f5a0e63d277e
-
Filesize
743B
MD5ba6115ad6f7d86261f8c6f87a007a44a
SHA14356173d94a391cf9d8300561864e11302b2a101
SHA256d540ed9f50e9fae86ada2e15a683a26ff7f44289b640841c1c8b84014233cbf5
SHA512bad9ba2c46f02281c2961f9b45bad5298c4f0e4e333f0b8f75cbf2104608b832bef3ca97fa2f83077cf2e867fdf9366ad7d551606a33f0b1ccb9e0bf97e2e1f4
-
Filesize
743B
MD50810b2bf273f247893a309e7c28f2f77
SHA1ce453f4c13e8c82b84d7ae489d483a6fc020844b
SHA2561acb333b8f6649a966339896ca11f92b5b08106443a0a340e3986cb25d59ccef
SHA512e392e0dd705af82cb4dcb686036f983d98de520e57b7510f3420dd9b7f23d129c51b3a23ca75c49cf714dee3704eb5a60dc24c9a19462b09c173de7c3ef267d0
-
Filesize
743B
MD5b26b53442243ddf60685b746c32a0e07
SHA1aa585329e3921ac1a530a6e9598746e6058fba09
SHA256ccde0b0a1c225eae73a5b51ff720c1859eade7ae1bfa04a8826d8e37600c5ab5
SHA512a49ffb4e8c216c1b91ae43b591af07d7af6d7560fde075e2ae4fdc2b58f1fa40fbaa30346b6a4d7e62eaf82a033d5430208b22540d49aaadbbefe0bafe3cbba9
-
Filesize
743B
MD5cb9b41199d53f23bd89d4d8fd909a9db
SHA1fe7dc4654ec51deda888f6b96e5337297f9a8c69
SHA256848bda3d52d9c1443ec77e96eceeeabea683e8b9aa93e83c12e4e1f2a9e76e63
SHA512565dcf2e1d438b1e2e5a43faa4370b3d95bd24b96a8e2fc82c34fa6b12cb100e16b6871ae9ed9f3108f928ec29c95dac951fc77601f189aa40ccd7f96b91affa
-
Filesize
1.9MB
MD5580e5064ca4b779d1d09219a657b7d50
SHA14f8ea6b2f6a4a6d7b8557a5f77278bbf6b8f7161
SHA2562a6b133585b2961795c3cbb04a618a8686fee464bb3419e337140f9ded074dff
SHA51285c088a2263d6341adf1837beb64e5369482c27cd1108e7f7637a4cf3d206c817bfa6f1ed1cfdaca4f3e8f612202125c63981debe2ac0f1052d1b16dd2023e77