Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe
Resource
win10v2004-20220812-en
General
-
Target
9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe
-
Size
320KB
-
MD5
793d498a7c52db86001906f199900cbd
-
SHA1
3094e39497ce398648a532ac8f38557c9b77df0e
-
SHA256
9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db
-
SHA512
b646e8d0b1c1c3fd494f9da5269950955f5ee1aad3382f68e9ff591746ca2a2bb6966f8584aeee5dc9bfadc766fbafd0180ee595125edd1e836c3221caa03c60
-
SSDEEP
6144:vTwZo1IV3puaibGKFHi0mofhaH05kipz016580bHFbl86JQPDHDdx/QtqR:rXgvmzFHi0mo5aH0qMzd5807FRPJQPDV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" hmaagr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hmaagr.exe -
Adds policy Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqgiqdgt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqtiddttpwjjjncohpjmb.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqgiqdgt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqtiddttpwjjjncohpjmb.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqgiqdgt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aqparnzvnqzvrrckz.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyrwhxdtfcf = "hacqkjyxsykjilzkcjce.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqgiqdgt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\umnatrfdxcnljlyizfx.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqgiqdgt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tigqgbmhyaidyxho.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyrwhxdtfcf = "hacqkjyxsykjilzkcjce.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyrwhxdtfcf = "aqparnzvnqzvrrckz.exe" hmaagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqgiqdgt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aqparnzvnqzvrrckz.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyrwhxdtfcf = "tigqgbmhyaidyxho.exe" hmaagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyrwhxdtfcf = "umnatrfdxcnljlyizfx.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyrwhxdtfcf = "umnatrfdxcnljlyizfx.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\oyrwhxdtfcf = "wqtiddttpwjjjncohpjmb.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqgiqdgt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqtiddttpwjjjncohpjmb.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqgiqdgt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hacqkjyxsykjilzkcjce.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hmaagr.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hmaagr.exe -
Executes dropped EXE 2 IoCs
pid Process 1060 hmaagr.exe 1300 hmaagr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqtiddttpwjjjncohpjmb.exe ." hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lwqwizgxkimd = "tigqgbmhyaidyxho.exe" hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lwqwizgxkimd = "wqtiddttpwjjjncohpjmb.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "hacqkjyxsykjilzkcjce.exe ." hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lyucqjslaagzsp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aqparnzvnqzvrrckz.exe ." 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tigqgbmhyaidyxho.exe" hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hacqkjyxsykjilzkcjce.exe ." hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kwryldldrqvnf = "aqparnzvnqzvrrckz.exe ." hmaagr.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "wqtiddttpwjjjncohpjmb.exe ." 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hacqkjyxsykjilzkcjce.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lyucqjslaagzsp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hacqkjyxsykjilzkcjce.exe ." hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "wqtiddttpwjjjncohpjmb.exe" hmaagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lyucqjslaagzsp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aqparnzvnqzvrrckz.exe ." hmaagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jaameboleispmnziyd.exe ." hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oczixrbvlmtnhfo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hacqkjyxsykjilzkcjce.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\umnatrfdxcnljlyizfx.exe ." 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lwqwizgxkimd = "jaameboleispmnziyd.exe" hmaagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "tigqgbmhyaidyxho.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lyucqjslaagzsp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\umnatrfdxcnljlyizfx.exe ." hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hacqkjyxsykjilzkcjce.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oczixrbvlmtnhfo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hacqkjyxsykjilzkcjce.exe" hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jaameboleispmnziyd.exe ." 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "umnatrfdxcnljlyizfx.exe" hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aqparnzvnqzvrrckz.exe ." hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tigqgbmhyaidyxho.exe" hmaagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oczixrbvlmtnhfo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqtiddttpwjjjncohpjmb.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "umnatrfdxcnljlyizfx.exe" hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aqparnzvnqzvrrckz.exe ." hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lyucqjslaagzsp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\umnatrfdxcnljlyizfx.exe ." hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oczixrbvlmtnhfo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aqparnzvnqzvrrckz.exe" hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\umnatrfdxcnljlyizfx.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "umnatrfdxcnljlyizfx.exe ." 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kwryldldrqvnf = "umnatrfdxcnljlyizfx.exe ." 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kwryldldrqvnf = "hacqkjyxsykjilzkcjce.exe ." 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kwryldldrqvnf = "tigqgbmhyaidyxho.exe ." hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oczixrbvlmtnhfo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jaameboleispmnziyd.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "wqtiddttpwjjjncohpjmb.exe ." hmaagr.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "aqparnzvnqzvrrckz.exe ." hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lwqwizgxkimd = "umnatrfdxcnljlyizfx.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oczixrbvlmtnhfo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\umnatrfdxcnljlyizfx.exe" hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqtiddttpwjjjncohpjmb.exe" hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\umnatrfdxcnljlyizfx.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lyucqjslaagzsp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tigqgbmhyaidyxho.exe ." 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "wqtiddttpwjjjncohpjmb.exe" hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "wqtiddttpwjjjncohpjmb.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lwqwizgxkimd = "aqparnzvnqzvrrckz.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\umnatrfdxcnljlyizfx.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aizclzdrb = "tigqgbmhyaidyxho.exe" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "hacqkjyxsykjilzkcjce.exe ." hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\kwryldldrqvnf = "jaameboleispmnziyd.exe ." hmaagr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tcuyixcrcy = "wqtiddttpwjjjncohpjmb.exe ." hmaagr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lwqwizgxkimd = "hacqkjyxsykjilzkcjce.exe" hmaagr.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hmaagr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hmaagr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hmaagr.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 whatismyipaddress.com 25 whatismyip.everdot.org 36 www.showmyipaddress.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xweyydydeqinsbvmkxweyy.yde hmaagr.exe File created C:\Windows\SysWOW64\xweyydydeqinsbvmkxweyy.yde hmaagr.exe File opened for modification C:\Windows\SysWOW64\oyrwhxdtfcfvlfkmvtdwbmciykhkaqkpr.yib hmaagr.exe File created C:\Windows\SysWOW64\oyrwhxdtfcfvlfkmvtdwbmciykhkaqkpr.yib hmaagr.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\xweyydydeqinsbvmkxweyy.yde hmaagr.exe File created C:\Program Files (x86)\xweyydydeqinsbvmkxweyy.yde hmaagr.exe File opened for modification C:\Program Files (x86)\oyrwhxdtfcfvlfkmvtdwbmciykhkaqkpr.yib hmaagr.exe File created C:\Program Files (x86)\oyrwhxdtfcfvlfkmvtdwbmciykhkaqkpr.yib hmaagr.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\xweyydydeqinsbvmkxweyy.yde hmaagr.exe File opened for modification C:\Windows\oyrwhxdtfcfvlfkmvtdwbmciykhkaqkpr.yib hmaagr.exe File created C:\Windows\oyrwhxdtfcfvlfkmvtdwbmciykhkaqkpr.yib hmaagr.exe File opened for modification C:\Windows\xweyydydeqinsbvmkxweyy.yde hmaagr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings hmaagr.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings hmaagr.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1060 hmaagr.exe 1060 hmaagr.exe 1060 hmaagr.exe 1060 hmaagr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1060 hmaagr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1060 4932 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe 82 PID 4932 wrote to memory of 1060 4932 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe 82 PID 4932 wrote to memory of 1060 4932 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe 82 PID 4932 wrote to memory of 1300 4932 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe 83 PID 4932 wrote to memory of 1300 4932 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe 83 PID 4932 wrote to memory of 1300 4932 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe 83 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" hmaagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hmaagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" hmaagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hmaagr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hmaagr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe"C:\Users\Admin\AppData\Local\Temp\9b14c658ca65e6dbb15909058b378e7fec8926283309c59804117f34d48244db.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\hmaagr.exe"C:\Users\Admin\AppData\Local\Temp\hmaagr.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\hmaagr.exe"C:\Users\Admin\AppData\Local\Temp\hmaagr.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- System policy modification
PID:1300
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD597d5458f035f572a1abeb6bdb76f52e2
SHA1bc1c92bedd4cc214b0797179277ed7089ba4d206
SHA2561a946cbe95d45cf61ad200a73e741e6aff328dff97d99818e28702c4be06a5dd
SHA512ec230947ef14be512b171fca2efb004ba3f5551f8deaee53d0cb34297f001866f503277724af4d34668d3af036cf53fc8c1af39a14e6e6726f467fb08fc5b423
-
Filesize
712KB
MD597d5458f035f572a1abeb6bdb76f52e2
SHA1bc1c92bedd4cc214b0797179277ed7089ba4d206
SHA2561a946cbe95d45cf61ad200a73e741e6aff328dff97d99818e28702c4be06a5dd
SHA512ec230947ef14be512b171fca2efb004ba3f5551f8deaee53d0cb34297f001866f503277724af4d34668d3af036cf53fc8c1af39a14e6e6726f467fb08fc5b423
-
Filesize
712KB
MD597d5458f035f572a1abeb6bdb76f52e2
SHA1bc1c92bedd4cc214b0797179277ed7089ba4d206
SHA2561a946cbe95d45cf61ad200a73e741e6aff328dff97d99818e28702c4be06a5dd
SHA512ec230947ef14be512b171fca2efb004ba3f5551f8deaee53d0cb34297f001866f503277724af4d34668d3af036cf53fc8c1af39a14e6e6726f467fb08fc5b423