Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe
Resource
win10v2004-20220812-en
General
-
Target
4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe
-
Size
532KB
-
MD5
66edf43a932104c82116b711587d90b0
-
SHA1
f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
-
SHA256
4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
-
SHA512
a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
SSDEEP
12288:L2iwn/ND7S3xI66S/H3UyKxWn2hJ+MRmhhhitLpm1tT0:L213Sed0XjhwtLpwR0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" bbpwbes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bbpwbes.exe -
Adds policy Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\aduemsjtzf = "bnngxmmfujwtmkdgtbf.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\aduemsjtzf = "drtohyavmdsrmmhmblrfh.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bbpwbes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bnngxmmfujwtmkdgtbf.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bbpwbes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qbasiwvnbpbxpmegsz.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\aduemsjtzf = "obcwoefzpftrlkeiwfkx.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bbpwbes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\obcwoefzpftrlkeiwfkx.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\aduemsjtzf = "obcwoefzpftrlkeiwfkx.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\aduemsjtzf = "ajgwkwtjvhrlbwmm.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\aduemsjtzf = "qbasiwvnbpbxpmegsz.exe" ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bbpwbes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ajgwkwtjvhrlbwmm.exe" bbpwbes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bbpwbes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drtohyavmdsrmmhmblrfh.exe" ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bbpwbes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qbasiwvnbpbxpmegsz.exe" bbpwbes.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bbpwbes.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bbpwbes.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ixiyjejjshs.exe -
Executes dropped EXE 3 IoCs
pid Process 1520 ixiyjejjshs.exe 2032 bbpwbes.exe 1976 bbpwbes.exe -
Loads dropped DLL 6 IoCs
pid Process 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1520 ixiyjejjshs.exe 1520 ixiyjejjshs.exe 1520 ixiyjejjshs.exe 1520 ixiyjejjshs.exe -
Adds Run key to start application 2 TTPs 59 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "ajgwkwtjvhrlbwmm.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\sxqcmunzhpvl = "drtohyavmdsrmmhmblrfh.exe ." bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rxrepysfoxevi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bnngxmmfujwtmkdgtbf.exe ." ixiyjejjshs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qbasiwvnbpbxpmegsz.exe ." ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "bnngxmmfujwtmkdgtbf.exe" bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vzrclskvcjo = "bnngxmmfujwtmkdgtbf.exe" bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drtohyavmdsrmmhmblrfh.exe" bbpwbes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "bnngxmmfujwtmkdgtbf.exe ." bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "obcwoefzpftrlkeiwfkx.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drtohyavmdsrmmhmblrfh.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "bnngxmmfujwtmkdgtbf.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\szuiueznxhphvo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hrpgvigxkxiduqhit.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\sxqcmunzhpvl = "bnngxmmfujwtmkdgtbf.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drtohyavmdsrmmhmblrfh.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "obcwoefzpftrlkeiwfkx.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "qbasiwvnbpbxpmegsz.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hrpgvigxkxiduqhit.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\szuiueznxhphvo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qbasiwvnbpbxpmegsz.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rxrepysfoxevi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\obcwoefzpftrlkeiwfkx.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vzrclskvcjo = "ajgwkwtjvhrlbwmm.exe" bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bnngxmmfujwtmkdgtbf.exe" bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\sxqcmunzhpvl = "drtohyavmdsrmmhmblrfh.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\sxqcmunzhpvl = "obcwoefzpftrlkeiwfkx.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\sxqcmunzhpvl = "bnngxmmfujwtmkdgtbf.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vzrclskvcjo = "ajgwkwtjvhrlbwmm.exe" ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\szuiueznxhphvo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bnngxmmfujwtmkdgtbf.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\szuiueznxhphvo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bnngxmmfujwtmkdgtbf.exe" bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bnngxmmfujwtmkdgtbf.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rxrepysfoxevi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ajgwkwtjvhrlbwmm.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hrpgvigxkxiduqhit.exe ." bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rxrepysfoxevi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\obcwoefzpftrlkeiwfkx.exe ." bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "obcwoefzpftrlkeiwfkx.exe" bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\sxqcmunzhpvl = "qbasiwvnbpbxpmegsz.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qbasiwvnbpbxpmegsz.exe ." bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "hrpgvigxkxiduqhit.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hrpgvigxkxiduqhit.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\sxqcmunzhpvl = "qbasiwvnbpbxpmegsz.exe ." ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bbpwbes.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bnngxmmfujwtmkdgtbf.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vzrclskvcjo = "obcwoefzpftrlkeiwfkx.exe" bbpwbes.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rxrepysfoxevi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hrpgvigxkxiduqhit.exe ." bbpwbes.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\szuiueznxhphvo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drtohyavmdsrmmhmblrfh.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qrgouynv = "ajgwkwtjvhrlbwmm.exe" bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "qbasiwvnbpbxpmegsz.exe ." ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\hjzipukty = "drtohyavmdsrmmhmblrfh.exe ." ixiyjejjshs.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rxrepysfoxevi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hrpgvigxkxiduqhit.exe ." bbpwbes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ixiyjejjshs.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bbpwbes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rxrepysfoxevi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drtohyavmdsrmmhmblrfh.exe ." bbpwbes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vzrclskvcjo = "hrpgvigxkxiduqhit.exe" bbpwbes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixiyjejjshs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbpwbes.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbpwbes.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bbpwbes.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 www.showmyipaddress.com 4 whatismyip.everdot.org 6 whatismyipaddress.com -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\obcwoefzpftrlkeiwfkx.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\bnngxmmfujwtmkdgtbf.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\drtohyavmdsrmmhmblrfh.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\fzhihemnkhchiopavlxrzaz.efc bbpwbes.exe File created C:\Windows\SysWOW64\fzhihemnkhchiopavlxrzaz.efc bbpwbes.exe File opened for modification C:\Windows\SysWOW64\qbasiwvnbpbxpmegsz.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\bnngxmmfujwtmkdgtbf.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\drtohyavmdsrmmhmblrfh.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\hrpgvigxkxiduqhit.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\hrpgvigxkxiduqhit.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\qbasiwvnbpbxpmegsz.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\obcwoefzpftrlkeiwfkx.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\ujmicuxtldttpqmsitapso.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\hrpgvigxkxiduqhit.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\ajgwkwtjvhrlbwmm.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\qbasiwvnbpbxpmegsz.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\bnngxmmfujwtmkdgtbf.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\obcwoefzpftrlkeiwfkx.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\drtohyavmdsrmmhmblrfh.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\ajgwkwtjvhrlbwmm.exe bbpwbes.exe File created C:\Windows\SysWOW64\sxqcmunzhpvlxoawcdafykucvhpxdtfwie.lin bbpwbes.exe File opened for modification C:\Windows\SysWOW64\ajgwkwtjvhrlbwmm.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\ujmicuxtldttpqmsitapso.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\ujmicuxtldttpqmsitapso.exe bbpwbes.exe File opened for modification C:\Windows\SysWOW64\sxqcmunzhpvlxoawcdafykucvhpxdtfwie.lin bbpwbes.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\fzhihemnkhchiopavlxrzaz.efc bbpwbes.exe File created C:\Program Files (x86)\fzhihemnkhchiopavlxrzaz.efc bbpwbes.exe File opened for modification C:\Program Files (x86)\sxqcmunzhpvlxoawcdafykucvhpxdtfwie.lin bbpwbes.exe File created C:\Program Files (x86)\sxqcmunzhpvlxoawcdafykucvhpxdtfwie.lin bbpwbes.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\drtohyavmdsrmmhmblrfh.exe ixiyjejjshs.exe File opened for modification C:\Windows\obcwoefzpftrlkeiwfkx.exe bbpwbes.exe File opened for modification C:\Windows\hrpgvigxkxiduqhit.exe bbpwbes.exe File opened for modification C:\Windows\drtohyavmdsrmmhmblrfh.exe bbpwbes.exe File opened for modification C:\Windows\fzhihemnkhchiopavlxrzaz.efc bbpwbes.exe File opened for modification C:\Windows\sxqcmunzhpvlxoawcdafykucvhpxdtfwie.lin bbpwbes.exe File opened for modification C:\Windows\ajgwkwtjvhrlbwmm.exe ixiyjejjshs.exe File opened for modification C:\Windows\hrpgvigxkxiduqhit.exe bbpwbes.exe File opened for modification C:\Windows\bnngxmmfujwtmkdgtbf.exe bbpwbes.exe File opened for modification C:\Windows\ujmicuxtldttpqmsitapso.exe bbpwbes.exe File created C:\Windows\fzhihemnkhchiopavlxrzaz.efc bbpwbes.exe File opened for modification C:\Windows\bnngxmmfujwtmkdgtbf.exe bbpwbes.exe File opened for modification C:\Windows\obcwoefzpftrlkeiwfkx.exe bbpwbes.exe File opened for modification C:\Windows\hrpgvigxkxiduqhit.exe ixiyjejjshs.exe File opened for modification C:\Windows\qbasiwvnbpbxpmegsz.exe ixiyjejjshs.exe File opened for modification C:\Windows\obcwoefzpftrlkeiwfkx.exe ixiyjejjshs.exe File opened for modification C:\Windows\ajgwkwtjvhrlbwmm.exe bbpwbes.exe File opened for modification C:\Windows\ujmicuxtldttpqmsitapso.exe bbpwbes.exe File opened for modification C:\Windows\qbasiwvnbpbxpmegsz.exe bbpwbes.exe File created C:\Windows\sxqcmunzhpvlxoawcdafykucvhpxdtfwie.lin bbpwbes.exe File opened for modification C:\Windows\bnngxmmfujwtmkdgtbf.exe ixiyjejjshs.exe File opened for modification C:\Windows\ujmicuxtldttpqmsitapso.exe ixiyjejjshs.exe File opened for modification C:\Windows\qbasiwvnbpbxpmegsz.exe bbpwbes.exe File opened for modification C:\Windows\drtohyavmdsrmmhmblrfh.exe bbpwbes.exe File opened for modification C:\Windows\ajgwkwtjvhrlbwmm.exe bbpwbes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 2032 bbpwbes.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 bbpwbes.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1520 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 27 PID 1096 wrote to memory of 1520 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 27 PID 1096 wrote to memory of 1520 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 27 PID 1096 wrote to memory of 1520 1096 4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe 27 PID 1520 wrote to memory of 2032 1520 ixiyjejjshs.exe 28 PID 1520 wrote to memory of 2032 1520 ixiyjejjshs.exe 28 PID 1520 wrote to memory of 2032 1520 ixiyjejjshs.exe 28 PID 1520 wrote to memory of 2032 1520 ixiyjejjshs.exe 28 PID 1520 wrote to memory of 1976 1520 ixiyjejjshs.exe 29 PID 1520 wrote to memory of 1976 1520 ixiyjejjshs.exe 29 PID 1520 wrote to memory of 1976 1520 ixiyjejjshs.exe 29 PID 1520 wrote to memory of 1976 1520 ixiyjejjshs.exe 29 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bbpwbes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" bbpwbes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" bbpwbes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" bbpwbes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bbpwbes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" bbpwbes.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe"C:\Users\Admin\AppData\Local\Temp\4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\ixiyjejjshs.exe"C:\Users\Admin\AppData\Local\Temp\ixiyjejjshs.exe" "c:\users\admin\appdata\local\temp\4197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\bbpwbes.exe"C:\Users\Admin\AppData\Local\Temp\bbpwbes.exe" "-C:\Users\Admin\AppData\Local\Temp\ajgwkwtjvhrlbwmm.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\bbpwbes.exe"C:\Users\Admin\AppData\Local\Temp\bbpwbes.exe" "-C:\Users\Admin\AppData\Local\Temp\ajgwkwtjvhrlbwmm.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1976
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
720KB
MD552ef260a8d6b61bfc99ceaaf757a4514
SHA17eda34a5437df69b5d09184ad8288dc7011e2e3d
SHA256d18336173c332b33b14e21315599988c8df3cd6e80f5f29c3db84145ff37f087
SHA5120fc19c5f7a44daa0d0c84e7ba2c3cb17699885601dd4e2ecafb173eee1dd5094b89c659103e3232b14ac3cecb148fee2712a1457a100a2ae9f1a3aec71681366
-
Filesize
720KB
MD552ef260a8d6b61bfc99ceaaf757a4514
SHA17eda34a5437df69b5d09184ad8288dc7011e2e3d
SHA256d18336173c332b33b14e21315599988c8df3cd6e80f5f29c3db84145ff37f087
SHA5120fc19c5f7a44daa0d0c84e7ba2c3cb17699885601dd4e2ecafb173eee1dd5094b89c659103e3232b14ac3cecb148fee2712a1457a100a2ae9f1a3aec71681366
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
320KB
MD530c7edd833574c70c5f5e6853afcd517
SHA15d96d29e3c20e7fb0eccabd58e9585740ee96786
SHA2569f41d937b13e49a33d84d1190c37177ebfb4360cc064a89c7bfe9dc3bf5e03d8
SHA51261d4af9c2c8cf4c23dec66b57f20ffbb82f8903fc0e83dfbf36fc60f1ab463a5323aff80760fff65dc71fc9682714a4b4b5a9bd2e3ec030cdcb1ede48cc76313
-
Filesize
320KB
MD530c7edd833574c70c5f5e6853afcd517
SHA15d96d29e3c20e7fb0eccabd58e9585740ee96786
SHA2569f41d937b13e49a33d84d1190c37177ebfb4360cc064a89c7bfe9dc3bf5e03d8
SHA51261d4af9c2c8cf4c23dec66b57f20ffbb82f8903fc0e83dfbf36fc60f1ab463a5323aff80760fff65dc71fc9682714a4b4b5a9bd2e3ec030cdcb1ede48cc76313
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
532KB
MD566edf43a932104c82116b711587d90b0
SHA1f3dfb97201c691f6ed0b37cbf6f4ae0292131e4f
SHA2564197a14a44e9c944c958f8f4f581473aa370ccab4c0a21b91fc98fdf5b9dde23
SHA512a464c1365b4ee7a171d7498cba2291a145a64932249e76f4040e38e2255220ea26e6f33a6f5cd71430f740b446427d645ec86fd56e963b77704981db12604254
-
Filesize
720KB
MD552ef260a8d6b61bfc99ceaaf757a4514
SHA17eda34a5437df69b5d09184ad8288dc7011e2e3d
SHA256d18336173c332b33b14e21315599988c8df3cd6e80f5f29c3db84145ff37f087
SHA5120fc19c5f7a44daa0d0c84e7ba2c3cb17699885601dd4e2ecafb173eee1dd5094b89c659103e3232b14ac3cecb148fee2712a1457a100a2ae9f1a3aec71681366
-
Filesize
720KB
MD552ef260a8d6b61bfc99ceaaf757a4514
SHA17eda34a5437df69b5d09184ad8288dc7011e2e3d
SHA256d18336173c332b33b14e21315599988c8df3cd6e80f5f29c3db84145ff37f087
SHA5120fc19c5f7a44daa0d0c84e7ba2c3cb17699885601dd4e2ecafb173eee1dd5094b89c659103e3232b14ac3cecb148fee2712a1457a100a2ae9f1a3aec71681366
-
Filesize
720KB
MD552ef260a8d6b61bfc99ceaaf757a4514
SHA17eda34a5437df69b5d09184ad8288dc7011e2e3d
SHA256d18336173c332b33b14e21315599988c8df3cd6e80f5f29c3db84145ff37f087
SHA5120fc19c5f7a44daa0d0c84e7ba2c3cb17699885601dd4e2ecafb173eee1dd5094b89c659103e3232b14ac3cecb148fee2712a1457a100a2ae9f1a3aec71681366
-
Filesize
720KB
MD552ef260a8d6b61bfc99ceaaf757a4514
SHA17eda34a5437df69b5d09184ad8288dc7011e2e3d
SHA256d18336173c332b33b14e21315599988c8df3cd6e80f5f29c3db84145ff37f087
SHA5120fc19c5f7a44daa0d0c84e7ba2c3cb17699885601dd4e2ecafb173eee1dd5094b89c659103e3232b14ac3cecb148fee2712a1457a100a2ae9f1a3aec71681366
-
Filesize
320KB
MD530c7edd833574c70c5f5e6853afcd517
SHA15d96d29e3c20e7fb0eccabd58e9585740ee96786
SHA2569f41d937b13e49a33d84d1190c37177ebfb4360cc064a89c7bfe9dc3bf5e03d8
SHA51261d4af9c2c8cf4c23dec66b57f20ffbb82f8903fc0e83dfbf36fc60f1ab463a5323aff80760fff65dc71fc9682714a4b4b5a9bd2e3ec030cdcb1ede48cc76313
-
Filesize
320KB
MD530c7edd833574c70c5f5e6853afcd517
SHA15d96d29e3c20e7fb0eccabd58e9585740ee96786
SHA2569f41d937b13e49a33d84d1190c37177ebfb4360cc064a89c7bfe9dc3bf5e03d8
SHA51261d4af9c2c8cf4c23dec66b57f20ffbb82f8903fc0e83dfbf36fc60f1ab463a5323aff80760fff65dc71fc9682714a4b4b5a9bd2e3ec030cdcb1ede48cc76313