Analysis

  • max time kernel
    58s
  • max time network
    63s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 14:30

General

  • Target

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe

  • Size

    452KB

  • MD5

    028d44613ff80e30f1288b1c720cbdca

  • SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

  • SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

  • SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • SSDEEP

    6144:ecIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUh:JIXsgtvm1De5YlOx6lzBH46Uh

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 18 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe
    "C:\Users\Admin\AppData\Local\Temp\72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe
      "C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe" "c:\users\admin\appdata\local\temp\72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4756
      • C:\Users\Admin\AppData\Local\Temp\yfnps.exe
        "C:\Users\Admin\AppData\Local\Temp\yfnps.exe" "-C:\Users\Admin\AppData\Local\Temp\vngthaqcxaidyxho.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:1936
      • C:\Users\Admin\AppData\Local\Temp\yfnps.exe
        "C:\Users\Admin\AppData\Local\Temp\yfnps.exe" "-C:\Users\Admin\AppData\Local\Temp\vngthaqcxaidyxho.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:4348
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:4948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cvpdsmdqmqzvrrckz.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe

    Filesize

    320KB

    MD5

    7ab8e4eed909e0f8bc7763bba652ef1d

    SHA1

    16acd6aa3c1a15018091a50fd392af31c1686075

    SHA256

    87b2f7a5d6fef01678ce7c4ed49fd73835ebc46ddbb82a4e4f2ace524527b24e

    SHA512

    c3005a2d2338ff9af01bc165ed74fb35dc7e737d87c69c8a21620bda34a8e268553de8361d321110d419f3bb2488e2f5c56d1459e20743d4c0c074dbab076727

  • C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe

    Filesize

    320KB

    MD5

    7ab8e4eed909e0f8bc7763bba652ef1d

    SHA1

    16acd6aa3c1a15018091a50fd392af31c1686075

    SHA256

    87b2f7a5d6fef01678ce7c4ed49fd73835ebc46ddbb82a4e4f2ace524527b24e

    SHA512

    c3005a2d2338ff9af01bc165ed74fb35dc7e737d87c69c8a21620bda34a8e268553de8361d321110d419f3bb2488e2f5c56d1459e20743d4c0c074dbab076727

  • C:\Users\Admin\AppData\Local\Temp\jfctlicsrykjilzkclhe.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Users\Admin\AppData\Local\Temp\lfapfasgdispmnziyf.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Users\Admin\AppData\Local\Temp\pnmfzyumnwklmrhuozxwpj.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Users\Admin\AppData\Local\Temp\vngthaqcxaidyxho.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Users\Admin\AppData\Local\Temp\wrnduqjywcnljlyizhc.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Users\Admin\AppData\Local\Temp\yfnps.exe

    Filesize

    700KB

    MD5

    7da9a0627780ef627a581ee1791e53c0

    SHA1

    efb0bccdfebc89b5fe8d08518b8030d249fad10d

    SHA256

    c9846184b6d2d60e4ce273daaba4f830566b20e9399b06d3bf2be3bb7fbbb3e9

    SHA512

    bbea3e749e43fd495efa7eeecaecc03d92cfeeb20c99d9909c1327af061c1c244b2b660352c1a2c941deda7b30e3c2eef0d6b3dfbecc3cdb6cfed4cc9bb80974

  • C:\Users\Admin\AppData\Local\Temp\yfnps.exe

    Filesize

    700KB

    MD5

    7da9a0627780ef627a581ee1791e53c0

    SHA1

    efb0bccdfebc89b5fe8d08518b8030d249fad10d

    SHA256

    c9846184b6d2d60e4ce273daaba4f830566b20e9399b06d3bf2be3bb7fbbb3e9

    SHA512

    bbea3e749e43fd495efa7eeecaecc03d92cfeeb20c99d9909c1327af061c1c244b2b660352c1a2c941deda7b30e3c2eef0d6b3dfbecc3cdb6cfed4cc9bb80974

  • C:\Users\Admin\AppData\Local\Temp\yfnps.exe

    Filesize

    700KB

    MD5

    7da9a0627780ef627a581ee1791e53c0

    SHA1

    efb0bccdfebc89b5fe8d08518b8030d249fad10d

    SHA256

    c9846184b6d2d60e4ce273daaba4f830566b20e9399b06d3bf2be3bb7fbbb3e9

    SHA512

    bbea3e749e43fd495efa7eeecaecc03d92cfeeb20c99d9909c1327af061c1c244b2b660352c1a2c941deda7b30e3c2eef0d6b3dfbecc3cdb6cfed4cc9bb80974

  • C:\Users\Admin\AppData\Local\Temp\yvtlecxoowjjjncohrome.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\SysWOW64\cvpdsmdqmqzvrrckz.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\SysWOW64\jfctlicsrykjilzkclhe.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\SysWOW64\lfapfasgdispmnziyf.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\SysWOW64\pnmfzyumnwklmrhuozxwpj.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\SysWOW64\vngthaqcxaidyxho.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\SysWOW64\wrnduqjywcnljlyizhc.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\SysWOW64\yvtlecxoowjjjncohrome.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\cvpdsmdqmqzvrrckz.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\cvpdsmdqmqzvrrckz.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\jfctlicsrykjilzkclhe.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\jfctlicsrykjilzkclhe.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\lfapfasgdispmnziyf.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\lfapfasgdispmnziyf.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\pnmfzyumnwklmrhuozxwpj.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\pnmfzyumnwklmrhuozxwpj.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\vngthaqcxaidyxho.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\vngthaqcxaidyxho.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\wrnduqjywcnljlyizhc.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\wrnduqjywcnljlyizhc.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\yvtlecxoowjjjncohrome.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89

  • C:\Windows\yvtlecxoowjjjncohrome.exe

    Filesize

    452KB

    MD5

    028d44613ff80e30f1288b1c720cbdca

    SHA1

    94223f5827fa0ed2714edca533cfd7e96c31c34a

    SHA256

    72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d

    SHA512

    84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89