Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe
Resource
win10v2004-20250410-en
General
-
Target
b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe
-
Size
3.1MB
-
MD5
2d9734caef2b9c85f766b5515ace678f
-
SHA1
e5fc3d7534b916672a6c3497b7a8d4bdfb02302f
-
SHA256
b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9
-
SHA512
1b4c045eddf179a8a7cfa15d3671aaa9caec0902ae161d1403312c401d7f7473a32e90cb28bec4d67a589d8835689acb847427f28b1b7e69b10476a2e03e4a22
-
SSDEEP
49152:/uWJCbWi2qRTN6DtXrVr1u668B1ECYJgkVFLmX28xO5tL:/ugCSiD6ZXrVr1l68B+5JLFLm7xQtL
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe -
Modifies registry class 55 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ThreadingModel = "Apartment" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Programmable b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\NzXq\ = "vyyzrsdbCCNyoZDRMXPd{teM^Q" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dnXEmpr\ = "vSypVhdHzQv[[BDpP|eZdkMInsEBuBKr" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\kfplqxqnwzKzZ\ = "nMu@rn{G{WjDYh\\ECHrK" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\NzXq\ = "vwGwWhCZpTmOc\\~l]HQdj\x7fdYhK" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dnXEmpr\ = "vSypVhdHzQv[[BDpP|eZd[MInsEBurKr" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\qwduCc b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\qwduCc\ = "HgUWvoFByIGrzjr|n~mhIOyG" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\roypah\ = "KeS_sNvxssJxmM\\f@XhFV\\X" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\NzXq b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\uvzlukg\ = "AbVOet_DrnOsbgIW}hdd{HP]S" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\roypah\ = "KeS_sNvxssJymM\\f@WzMiM\\" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\roypah\ = "KeS_sNvxssJzmM\\f@Z{wAI@" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\qwduCc\ = "HgUWwoFByIGrzjr|n~mhIOyG" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Control b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Version b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Version\ = "1.0" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\VersionIndependentProgID\ = "CommunicatorMeetingJoinAx.JoinManager" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\uuJziR b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\kfplqxqnwzKzZ b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dnXEmpr\ = "expnEsz{^\x7fx{^q`l}TRTz^szWK~[vnyS" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dnXEmpr\ = "expnEsz{^\x7fx{^q`l}TRTznszWK~[v^yS" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC} b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\TypeLib b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\NzXq b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\uuJziR b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\uvzlukg b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\qwduCc b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\roypah\ = "@tmaZEeQ\x7fpWURG~AoAVc_~`" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\roypah\ = "@tmaZEeQ\x7fpWVRG~AoLWYwz|" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ = "C:\\Program Files\\Microsoft Office\\root\\VFS\\ProgramFilesX86\\Microsoft Office\\Office16\\Interceptor.dll" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ProgID\ = "CommunicatorMeetingJoinAx.JoinManager.2" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\VersionIndependentProgID b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\roypah b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\roypah\ = "@tmaZEeQ\x7fpWTRG~AoNDh`od" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\qwduCc\ = "MdwqJtBzkjBq{fLw_sHxlMsZ" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32 b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ProgID b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\TypeLib\ = "{D6DA003A-AFF3-4850-A161-F3D883FF2447}" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\roypah b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\kfplqxqnwzKzZ\ = "]\\c}RVO\x7fu|ma[Ww}h\x7f^X" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\AppID = "{561C57B5-CC32-438F-A667-860E43345537}" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\uvzlukg\ = "OsWv@PeoKT}vI`KIPyNqQVmxl" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649} b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\uuJziR\ = "uXpYgzEJG`FTe`QtokQRDjoayF\\hD" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\dnXEmpr b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\qwduCc\ = "MdwqKtBzkjBq{fLw_sHxlMsZ" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\roypah\ = "KeS_sNvxssJ{mM\\f@[LCVfh" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ = "MeetingJoinHelper Class" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\uuJziR\ = "VNdEOR_`CPaEyiT]Wn{EtnWkOB`fT" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\uvzlukg b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\dnXEmpr b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Key created \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\kfplqxqnwzKzZ b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\roypah\ = "@tmaZEeQ\x7fpWWRG~AoM`m`UT" b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:BC2EA88B b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe File opened for modification C:\ProgramData\TEMP:BC2EA88B b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 5548 b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Token: SeIncBasePriorityPrivilege 5548 b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Token: 33 4888 b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe Token: SeIncBasePriorityPrivilege 4888 b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5548 wrote to memory of 4888 5548 b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe 92 PID 5548 wrote to memory of 4888 5548 b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe 92 PID 5548 wrote to memory of 4888 5548 b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe"C:\Users\Admin\AppData\Local\Temp\b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5548 -
C:\Users\Admin\AppData\Local\Temp\b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe"C:\Users\Admin\AppData\Local\Temp\b60d44ad33f55b392ee278bc538741c7b0d2873a2a1f4259884b9b5bca3c48e9.exe"2⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD589fd900891f1d4aad6c9df3b88fd8e8e
SHA1ee5355875f6cd61e31cdab6e27ec3e97f7e26dd6
SHA256f9131a59b043f6dba4c3fd403a39d5f950496ed85f06f45d9e2df0e4e082144a
SHA51220e1dbe3b5890496be824ccc2848f64807fcaedbff795acebdb92d102d3701d1eaac33a8feca9757244b661f7f36a7116f9ccc4c0c5aa834c55649e4ecebc083