Analysis
-
max time kernel
58s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe
Resource
win10v2004-20220812-en
General
-
Target
72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe
-
Size
452KB
-
MD5
028d44613ff80e30f1288b1c720cbdca
-
SHA1
94223f5827fa0ed2714edca533cfd7e96c31c34a
-
SHA256
72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
-
SHA512
84c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
SSDEEP
6144:ecIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUh:JIXsgtvm1De5YlOx6lzBH46Uh
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" hkaqkpraruk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yfnps.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yfnps.exe -
Adds policy Run key to start application 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run hkaqkpraruk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yfnps = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrnduqjywcnljlyizhc.exe" hkaqkpraruk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lvglrcko = "lfapfasgdispmnziyf.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yfnps = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jfctlicsrykjilzkclhe.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lvglrcko = "lfapfasgdispmnziyf.exe" hkaqkpraruk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lvglrcko = "vngthaqcxaidyxho.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lvglrcko = "cvpdsmdqmqzvrrckz.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yfnps = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yvtlecxoowjjjncohrome.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lvglrcko = "wrnduqjywcnljlyizhc.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yfnps = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lfapfasgdispmnziyf.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yfnps = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrnduqjywcnljlyizhc.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lvglrcko = "wrnduqjywcnljlyizhc.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lvglrcko = "yvtlecxoowjjjncohrome.exe" hkaqkpraruk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yfnps = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvpdsmdqmqzvrrckz.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lvglrcko = "cvpdsmdqmqzvrrckz.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yfnps = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvpdsmdqmqzvrrckz.exe" yfnps.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yfnps.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hkaqkpraruk.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yfnps.exe -
Executes dropped EXE 3 IoCs
pid Process 4756 hkaqkpraruk.exe 1936 yfnps.exe 4348 yfnps.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hkaqkpraruk.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jradhq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrnduqjywcnljlyizhc.exe" hkaqkpraruk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qdrziwhoecf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lfapfasgdispmnziyf.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "lfapfasgdispmnziyf.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qdrziwhoecf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrnduqjywcnljlyizhc.exe ." yfnps.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce hkaqkpraruk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nbqzjyksjimd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrnduqjywcnljlyizhc.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jradhq = "jfctlicsrykjilzkclhe.exe" yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jradhq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yvtlecxoowjjjncohrome.exe" yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvpdsmdqmqzvrrckz.exe ." yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jradhq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yvtlecxoowjjjncohrome.exe" yfnps.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hkaqkpraruk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cnzfmyhma = "cvpdsmdqmqzvrrckz.exe" yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vhubjwgmby = "jfctlicsrykjilzkclhe.exe ." yfnps.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run hkaqkpraruk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cnzfmyhma = "vngthaqcxaidyxho.exe" hkaqkpraruk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vhubjwgmby = "wrnduqjywcnljlyizhc.exe ." hkaqkpraruk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vhubjwgmby = "wrnduqjywcnljlyizhc.exe ." yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vhubjwgmby = "lfapfasgdispmnziyf.exe ." yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vhubjwgmby = "lfapfasgdispmnziyf.exe ." hkaqkpraruk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cnzfmyhma = "jfctlicsrykjilzkclhe.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qdrziwhoecf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vngthaqcxaidyxho.exe ." hkaqkpraruk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lfapfasgdispmnziyf.exe ." hkaqkpraruk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "lfapfasgdispmnziyf.exe ." hkaqkpraruk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qdrziwhoecf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jfctlicsrykjilzkclhe.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jradhq = "vngthaqcxaidyxho.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qdrziwhoecf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvpdsmdqmqzvrrckz.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nbqzjyksjimd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lfapfasgdispmnziyf.exe" yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrnduqjywcnljlyizhc.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qdrziwhoecf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jfctlicsrykjilzkclhe.exe ." yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yvtlecxoowjjjncohrome.exe ." yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jradhq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vngthaqcxaidyxho.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nbqzjyksjimd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lfapfasgdispmnziyf.exe" hkaqkpraruk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jradhq = "jfctlicsrykjilzkclhe.exe" hkaqkpraruk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run yfnps.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qdrziwhoecf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvpdsmdqmqzvrrckz.exe ." yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cnzfmyhma = "lfapfasgdispmnziyf.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jradhq = "lfapfasgdispmnziyf.exe" hkaqkpraruk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cnzfmyhma = "vngthaqcxaidyxho.exe" yfnps.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yvtlecxoowjjjncohrome.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "wrnduqjywcnljlyizhc.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nbqzjyksjimd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yvtlecxoowjjjncohrome.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qdrziwhoecf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vngthaqcxaidyxho.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jradhq = "cvpdsmdqmqzvrrckz.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nbqzjyksjimd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvpdsmdqmqzvrrckz.exe" yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cnzfmyhma = "cvpdsmdqmqzvrrckz.exe" yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vhubjwgmby = "vngthaqcxaidyxho.exe ." yfnps.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run yfnps.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vhubjwgmby = "wrnduqjywcnljlyizhc.exe ." yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jradhq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrnduqjywcnljlyizhc.exe" yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cnzfmyhma = "wrnduqjywcnljlyizhc.exe" yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cnzfmyhma = "lfapfasgdispmnziyf.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "lfapfasgdispmnziyf.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nbqzjyksjimd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lfapfasgdispmnziyf.exe" yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "wrnduqjywcnljlyizhc.exe ." hkaqkpraruk.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yfnps.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vhubjwgmby = "vngthaqcxaidyxho.exe ." yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lfapfasgdispmnziyf.exe ." yfnps.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jradhq = "jfctlicsrykjilzkclhe.exe" yfnps.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wfptyip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvpdsmdqmqzvrrckz.exe ." yfnps.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hkaqkpraruk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yfnps.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yfnps.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yfnps.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 www.showmyipaddress.com 4 whatismyipaddress.com 6 whatismyip.everdot.org 11 whatismyip.everdot.org 13 whatismyip.everdot.org -
Drops file in System32 directory 27 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\nbqzjyksjimdupvyijxmvfugofeizqlrue.tir yfnps.exe File created C:\Windows\SysWOW64\nbqzjyksjimdupvyijxmvfugofeizqlrue.tir yfnps.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{EB1E2384-DC6E-42C3-BDAF-181161CB7B9B}.catalogItem svchost.exe File opened for modification C:\Windows\SysWOW64\yvtlecxoowjjjncohrome.exe hkaqkpraruk.exe File opened for modification C:\Windows\SysWOW64\vngthaqcxaidyxho.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\wrnduqjywcnljlyizhc.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\vngthaqcxaidyxho.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\vngthaqcxaidyxho.exe hkaqkpraruk.exe File opened for modification C:\Windows\SysWOW64\cvpdsmdqmqzvrrckz.exe hkaqkpraruk.exe File opened for modification C:\Windows\SysWOW64\lfapfasgdispmnziyf.exe hkaqkpraruk.exe File opened for modification C:\Windows\SysWOW64\wrnduqjywcnljlyizhc.exe hkaqkpraruk.exe File opened for modification C:\Windows\SysWOW64\lfapfasgdispmnziyf.exe yfnps.exe File created C:\Windows\SysWOW64\adhfeijgmatzfpkcbruywvz.xdr yfnps.exe File opened for modification C:\Windows\SysWOW64\pnmfzyumnwklmrhuozxwpj.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\jfctlicsrykjilzkclhe.exe hkaqkpraruk.exe File opened for modification C:\Windows\SysWOW64\pnmfzyumnwklmrhuozxwpj.exe hkaqkpraruk.exe File opened for modification C:\Windows\SysWOW64\jfctlicsrykjilzkclhe.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\yvtlecxoowjjjncohrome.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\jfctlicsrykjilzkclhe.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\wrnduqjywcnljlyizhc.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\adhfeijgmatzfpkcbruywvz.xdr yfnps.exe File opened for modification C:\Windows\SysWOW64\lfapfasgdispmnziyf.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\pnmfzyumnwklmrhuozxwpj.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\cvpdsmdqmqzvrrckz.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\cvpdsmdqmqzvrrckz.exe yfnps.exe File opened for modification C:\Windows\SysWOW64\yvtlecxoowjjjncohrome.exe yfnps.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{D20FAA4E-F9C5-49A5-A5E8-B4775D821862}.catalogItem svchost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\adhfeijgmatzfpkcbruywvz.xdr yfnps.exe File created C:\Program Files (x86)\adhfeijgmatzfpkcbruywvz.xdr yfnps.exe File opened for modification C:\Program Files (x86)\nbqzjyksjimdupvyijxmvfugofeizqlrue.tir yfnps.exe File created C:\Program Files (x86)\nbqzjyksjimdupvyijxmvfugofeizqlrue.tir yfnps.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\vngthaqcxaidyxho.exe yfnps.exe File opened for modification C:\Windows\cvpdsmdqmqzvrrckz.exe yfnps.exe File opened for modification C:\Windows\yvtlecxoowjjjncohrome.exe hkaqkpraruk.exe File opened for modification C:\Windows\pnmfzyumnwklmrhuozxwpj.exe hkaqkpraruk.exe File opened for modification C:\Windows\vngthaqcxaidyxho.exe yfnps.exe File opened for modification C:\Windows\jfctlicsrykjilzkclhe.exe yfnps.exe File opened for modification C:\Windows\yvtlecxoowjjjncohrome.exe yfnps.exe File opened for modification C:\Windows\pnmfzyumnwklmrhuozxwpj.exe yfnps.exe File opened for modification C:\Windows\lfapfasgdispmnziyf.exe yfnps.exe File opened for modification C:\Windows\nbqzjyksjimdupvyijxmvfugofeizqlrue.tir yfnps.exe File opened for modification C:\Windows\wrnduqjywcnljlyizhc.exe hkaqkpraruk.exe File opened for modification C:\Windows\jfctlicsrykjilzkclhe.exe hkaqkpraruk.exe File opened for modification C:\Windows\cvpdsmdqmqzvrrckz.exe yfnps.exe File opened for modification C:\Windows\adhfeijgmatzfpkcbruywvz.xdr yfnps.exe File opened for modification C:\Windows\cvpdsmdqmqzvrrckz.exe hkaqkpraruk.exe File opened for modification C:\Windows\wrnduqjywcnljlyizhc.exe yfnps.exe File opened for modification C:\Windows\yvtlecxoowjjjncohrome.exe yfnps.exe File opened for modification C:\Windows\pnmfzyumnwklmrhuozxwpj.exe yfnps.exe File created C:\Windows\adhfeijgmatzfpkcbruywvz.xdr yfnps.exe File opened for modification C:\Windows\vngthaqcxaidyxho.exe hkaqkpraruk.exe File opened for modification C:\Windows\lfapfasgdispmnziyf.exe hkaqkpraruk.exe File opened for modification C:\Windows\lfapfasgdispmnziyf.exe yfnps.exe File opened for modification C:\Windows\wrnduqjywcnljlyizhc.exe yfnps.exe File opened for modification C:\Windows\jfctlicsrykjilzkclhe.exe yfnps.exe File created C:\Windows\nbqzjyksjimdupvyijxmvfugofeizqlrue.tir yfnps.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 1936 yfnps.exe 1936 yfnps.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 1936 yfnps.exe 1936 yfnps.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1936 yfnps.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2228 wrote to memory of 4756 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 75 PID 2228 wrote to memory of 4756 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 75 PID 2228 wrote to memory of 4756 2228 72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe 75 PID 4756 wrote to memory of 1936 4756 hkaqkpraruk.exe 76 PID 4756 wrote to memory of 1936 4756 hkaqkpraruk.exe 76 PID 4756 wrote to memory of 1936 4756 hkaqkpraruk.exe 76 PID 4756 wrote to memory of 4348 4756 hkaqkpraruk.exe 77 PID 4756 wrote to memory of 4348 4756 hkaqkpraruk.exe 77 PID 4756 wrote to memory of 4348 4756 hkaqkpraruk.exe 77 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" hkaqkpraruk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yfnps.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" hkaqkpraruk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer hkaqkpraruk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yfnps.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yfnps.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hkaqkpraruk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yfnps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yfnps.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe"C:\Users\Admin\AppData\Local\Temp\72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe"C:\Users\Admin\AppData\Local\Temp\hkaqkpraruk.exe" "c:\users\admin\appdata\local\temp\72adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\yfnps.exe"C:\Users\Admin\AppData\Local\Temp\yfnps.exe" "-C:\Users\Admin\AppData\Local\Temp\vngthaqcxaidyxho.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\yfnps.exe"C:\Users\Admin\AppData\Local\Temp\yfnps.exe" "-C:\Users\Admin\AppData\Local\Temp\vngthaqcxaidyxho.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:4348
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
320KB
MD57ab8e4eed909e0f8bc7763bba652ef1d
SHA116acd6aa3c1a15018091a50fd392af31c1686075
SHA25687b2f7a5d6fef01678ce7c4ed49fd73835ebc46ddbb82a4e4f2ace524527b24e
SHA512c3005a2d2338ff9af01bc165ed74fb35dc7e737d87c69c8a21620bda34a8e268553de8361d321110d419f3bb2488e2f5c56d1459e20743d4c0c074dbab076727
-
Filesize
320KB
MD57ab8e4eed909e0f8bc7763bba652ef1d
SHA116acd6aa3c1a15018091a50fd392af31c1686075
SHA25687b2f7a5d6fef01678ce7c4ed49fd73835ebc46ddbb82a4e4f2ace524527b24e
SHA512c3005a2d2338ff9af01bc165ed74fb35dc7e737d87c69c8a21620bda34a8e268553de8361d321110d419f3bb2488e2f5c56d1459e20743d4c0c074dbab076727
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
700KB
MD57da9a0627780ef627a581ee1791e53c0
SHA1efb0bccdfebc89b5fe8d08518b8030d249fad10d
SHA256c9846184b6d2d60e4ce273daaba4f830566b20e9399b06d3bf2be3bb7fbbb3e9
SHA512bbea3e749e43fd495efa7eeecaecc03d92cfeeb20c99d9909c1327af061c1c244b2b660352c1a2c941deda7b30e3c2eef0d6b3dfbecc3cdb6cfed4cc9bb80974
-
Filesize
700KB
MD57da9a0627780ef627a581ee1791e53c0
SHA1efb0bccdfebc89b5fe8d08518b8030d249fad10d
SHA256c9846184b6d2d60e4ce273daaba4f830566b20e9399b06d3bf2be3bb7fbbb3e9
SHA512bbea3e749e43fd495efa7eeecaecc03d92cfeeb20c99d9909c1327af061c1c244b2b660352c1a2c941deda7b30e3c2eef0d6b3dfbecc3cdb6cfed4cc9bb80974
-
Filesize
700KB
MD57da9a0627780ef627a581ee1791e53c0
SHA1efb0bccdfebc89b5fe8d08518b8030d249fad10d
SHA256c9846184b6d2d60e4ce273daaba4f830566b20e9399b06d3bf2be3bb7fbbb3e9
SHA512bbea3e749e43fd495efa7eeecaecc03d92cfeeb20c99d9909c1327af061c1c244b2b660352c1a2c941deda7b30e3c2eef0d6b3dfbecc3cdb6cfed4cc9bb80974
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89
-
Filesize
452KB
MD5028d44613ff80e30f1288b1c720cbdca
SHA194223f5827fa0ed2714edca533cfd7e96c31c34a
SHA25672adc870e88af296e4b421674faa29b68080c2780ac35588fa0a73bccb10194d
SHA51284c81d2e616e8eed9ec8c3ef520d2db0936796254341f51f392854e674087e6ca4dbb09e4a70d0cb7daa04607b668a728b6aa63e076762d230b7f4609faade89