Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 19:25
Static task
static1
Behavioral task
behavioral1
Sample
6beb38b23964322e9fcc881ef51e7819.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6beb38b23964322e9fcc881ef51e7819.exe
Resource
win10v2004-20220812-en
General
-
Target
6beb38b23964322e9fcc881ef51e7819.exe
-
Size
408KB
-
MD5
6beb38b23964322e9fcc881ef51e7819
-
SHA1
71277568877c51cbb7a741a21cf96fc2e18d9e18
-
SHA256
85cfd8c4a34c7552ab58def454a0a286195f0522238406e4ab40e39724194c7a
-
SHA512
93b9d0ef14d9bf0437936f1c83c3b028e767c9a95287e4d7eaf6d32d123e91cd47dbf15c9f6735378752c4523cba530ca949b7f3b780fe31007886bd612f77df
-
SSDEEP
12288:4XgvmzFHi0mo5aH0qMzd58+7FksPJQPDHvd:4XgvOHi0mGaH0qSdlFkG4V
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" zbnmr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" zbnmr.exe -
Adds policy Run key to start application 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wduyivftuh = "xnnatpifplukohwgtjb.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wduyivftuh = "drparlcxfzguwnait.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xbpqxho = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kbcqkhbzkhrinhxiwngx.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xbpqxho = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kbcqkhbzkhrinhxiwngx.exe" zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wduyivftuh = "mbamezrnwrzorjxgsh.exe" zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xbpqxho = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kbcqkhbzkhrinhxiwngx.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xbpqxho = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drparlcxfzguwnait.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wduyivftuh = "wjgqgzpjqjpcdtfm.exe" zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wduyivftuh = "drparlcxfzguwnait.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xbpqxho = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wjgqgzpjqjpcdtfm.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xbpqxho = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbamezrnwrzorjxgsh.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wduyivftuh = "kbcqkhbzkhrinhxiwngx.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xbpqxho = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zrtidbwvhfqiojambtnfh.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xbpqxho = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zrtidbwvhfqiojambtnfh.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wduyivftuh = "zrtidbwvhfqiojambtnfh.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wduyivftuh = "wjgqgzpjqjpcdtfm.exe" zbnmr.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" zbnmr.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" zbnmr.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" zbnmr.exe -
Executes dropped EXE 2 IoCs
pid Process 1168 zbnmr.exe 984 zbnmr.exe -
Loads dropped DLL 4 IoCs
pid Process 1708 6beb38b23964322e9fcc881ef51e7819.exe 1708 6beb38b23964322e9fcc881ef51e7819.exe 1708 6beb38b23964322e9fcc881ef51e7819.exe 1708 6beb38b23964322e9fcc881ef51e7819.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ozucqhvnsjnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drparlcxfzguwnait.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ozucqhvnsjnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbamezrnwrzorjxgsh.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "mbamezrnwrzorjxgsh.exe ." 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rzrwhvgvxlm = "drparlcxfzguwnait.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "wjgqgzpjqjpcdtfm.exe" zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zrtidbwvhfqiojambtnfh.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rzrwhvgvxlm = "drparlcxfzguwnait.exe" 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rzrwhvgvxlm = "xnnatpifplukohwgtjb.exe" zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\oxqwixjzcrtc = "zrtidbwvhfqiojambtnfh.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xnnatpifplukohwgtjb.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drparlcxfzguwnait.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "zrtidbwvhfqiojambtnfh.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "kbcqkhbzkhrinhxiwngx.exe" zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbamezrnwrzorjxgsh.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nxrylbofjzcmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xnnatpifplukohwgtjb.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbamezrnwrzorjxgsh.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drparlcxfzguwnait.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "kbcqkhbzkhrinhxiwngx.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "wjgqgzpjqjpcdtfm.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "drparlcxfzguwnait.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rzrwhvgvxlm = "zrtidbwvhfqiojambtnfh.exe" zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbamezrnwrzorjxgsh.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "wjgqgzpjqjpcdtfm.exe" zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wjgqgzpjqjpcdtfm.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "zrtidbwvhfqiojambtnfh.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rzrwhvgvxlm = "zrtidbwvhfqiojambtnfh.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "wjgqgzpjqjpcdtfm.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zrtidbwvhfqiojambtnfh.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ozucqhvnsjnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drparlcxfzguwnait.exe" 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kbcqkhbzkhrinhxiwngx.exe ." 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rzrwhvgvxlm = "drparlcxfzguwnait.exe" zbnmr.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce zbnmr.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nxrylbofjzcmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbamezrnwrzorjxgsh.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "xnnatpifplukohwgtjb.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ozucqhvnsjnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbamezrnwrzorjxgsh.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nxrylbofjzcmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wjgqgzpjqjpcdtfm.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "mbamezrnwrzorjxgsh.exe ." zbnmr.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drparlcxfzguwnait.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ozucqhvnsjnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kbcqkhbzkhrinhxiwngx.exe" zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\oxqwixjzcrtc = "kbcqkhbzkhrinhxiwngx.exe ." 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\djzclxgtt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xnnatpifplukohwgtjb.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "zrtidbwvhfqiojambtnfh.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nxrylbofjzcmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbamezrnwrzorjxgsh.exe ." 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\oxqwixjzcrtc = "mbamezrnwrzorjxgsh.exe ." zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ozucqhvnsjnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zrtidbwvhfqiojambtnfh.exe" zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\oxqwixjzcrtc = "zrtidbwvhfqiojambtnfh.exe ." zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "drparlcxfzguwnait.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nxrylbofjzcmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mbamezrnwrzorjxgsh.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\oxqwixjzcrtc = "wjgqgzpjqjpcdtfm.exe ." zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\oxqwixjzcrtc = "mbamezrnwrzorjxgsh.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wjgqgzpjqjpcdtfm.exe" zbnmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nxrylbofjzcmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zrtidbwvhfqiojambtnfh.exe ." zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\mrgiqbjv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kbcqkhbzkhrinhxiwngx.exe" zbnmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\oxqwixjzcrtc = "xnnatpifplukohwgtjb.exe ." zbnmr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" zbnmr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" zbnmr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6beb38b23964322e9fcc881ef51e7819.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6beb38b23964322e9fcc881ef51e7819.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 www.showmyipaddress.com 13 whatismyip.everdot.org -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\zbnmrzenjrmoejkgfhlnzydlqzv.yaq zbnmr.exe File created C:\Windows\SysWOW64\zbnmrzenjrmoejkgfhlnzydlqzv.yaq zbnmr.exe File opened for modification C:\Windows\SysWOW64\wjgqgzpjqjpcdtfmwjylisibrlslrefvhoylan.ukd zbnmr.exe File created C:\Windows\SysWOW64\wjgqgzpjqjpcdtfmwjylisibrlslrefvhoylan.ukd zbnmr.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\wjgqgzpjqjpcdtfmwjylisibrlslrefvhoylan.ukd zbnmr.exe File created C:\Program Files (x86)\wjgqgzpjqjpcdtfmwjylisibrlslrefvhoylan.ukd zbnmr.exe File opened for modification C:\Program Files (x86)\zbnmrzenjrmoejkgfhlnzydlqzv.yaq zbnmr.exe File created C:\Program Files (x86)\zbnmrzenjrmoejkgfhlnzydlqzv.yaq zbnmr.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\wjgqgzpjqjpcdtfmwjylisibrlslrefvhoylan.ukd zbnmr.exe File opened for modification C:\Windows\zbnmrzenjrmoejkgfhlnzydlqzv.yaq zbnmr.exe File created C:\Windows\zbnmrzenjrmoejkgfhlnzydlqzv.yaq zbnmr.exe File opened for modification C:\Windows\wjgqgzpjqjpcdtfmwjylisibrlslrefvhoylan.ukd zbnmr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 zbnmr.exe 1168 zbnmr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1168 zbnmr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1168 1708 6beb38b23964322e9fcc881ef51e7819.exe 26 PID 1708 wrote to memory of 1168 1708 6beb38b23964322e9fcc881ef51e7819.exe 26 PID 1708 wrote to memory of 1168 1708 6beb38b23964322e9fcc881ef51e7819.exe 26 PID 1708 wrote to memory of 1168 1708 6beb38b23964322e9fcc881ef51e7819.exe 26 PID 1708 wrote to memory of 984 1708 6beb38b23964322e9fcc881ef51e7819.exe 27 PID 1708 wrote to memory of 984 1708 6beb38b23964322e9fcc881ef51e7819.exe 27 PID 1708 wrote to memory of 984 1708 6beb38b23964322e9fcc881ef51e7819.exe 27 PID 1708 wrote to memory of 984 1708 6beb38b23964322e9fcc881ef51e7819.exe 27 -
System policy modification 1 TTPs 36 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" zbnmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" zbnmr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" zbnmr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6beb38b23964322e9fcc881ef51e7819.exe"C:\Users\Admin\AppData\Local\Temp\6beb38b23964322e9fcc881ef51e7819.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\zbnmr.exe"C:\Users\Admin\AppData\Local\Temp\zbnmr.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\zbnmr.exe"C:\Users\Admin\AppData\Local\Temp\zbnmr.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System policy modification
PID:984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
804KB
MD5c274f63a6e75416e1963927dbcbd39c6
SHA175dbbd9d989b1f7bc5cc255ef4313837e516b270
SHA256a566ec625416299d07a79ee3576db83f19a73ea98d78a27208225517c30bdb1b
SHA5127471050e960bd57fc27dd2e296ea58ba1cdaae421a6a0e4e96edcdda61bc0322dee7395464410e66ad088c18a3a024f542571eeafe4f970e621887fac9cfc335
-
Filesize
804KB
MD5c274f63a6e75416e1963927dbcbd39c6
SHA175dbbd9d989b1f7bc5cc255ef4313837e516b270
SHA256a566ec625416299d07a79ee3576db83f19a73ea98d78a27208225517c30bdb1b
SHA5127471050e960bd57fc27dd2e296ea58ba1cdaae421a6a0e4e96edcdda61bc0322dee7395464410e66ad088c18a3a024f542571eeafe4f970e621887fac9cfc335
-
Filesize
804KB
MD5c274f63a6e75416e1963927dbcbd39c6
SHA175dbbd9d989b1f7bc5cc255ef4313837e516b270
SHA256a566ec625416299d07a79ee3576db83f19a73ea98d78a27208225517c30bdb1b
SHA5127471050e960bd57fc27dd2e296ea58ba1cdaae421a6a0e4e96edcdda61bc0322dee7395464410e66ad088c18a3a024f542571eeafe4f970e621887fac9cfc335
-
Filesize
804KB
MD5c274f63a6e75416e1963927dbcbd39c6
SHA175dbbd9d989b1f7bc5cc255ef4313837e516b270
SHA256a566ec625416299d07a79ee3576db83f19a73ea98d78a27208225517c30bdb1b
SHA5127471050e960bd57fc27dd2e296ea58ba1cdaae421a6a0e4e96edcdda61bc0322dee7395464410e66ad088c18a3a024f542571eeafe4f970e621887fac9cfc335
-
Filesize
804KB
MD5c274f63a6e75416e1963927dbcbd39c6
SHA175dbbd9d989b1f7bc5cc255ef4313837e516b270
SHA256a566ec625416299d07a79ee3576db83f19a73ea98d78a27208225517c30bdb1b
SHA5127471050e960bd57fc27dd2e296ea58ba1cdaae421a6a0e4e96edcdda61bc0322dee7395464410e66ad088c18a3a024f542571eeafe4f970e621887fac9cfc335
-
Filesize
804KB
MD5c274f63a6e75416e1963927dbcbd39c6
SHA175dbbd9d989b1f7bc5cc255ef4313837e516b270
SHA256a566ec625416299d07a79ee3576db83f19a73ea98d78a27208225517c30bdb1b
SHA5127471050e960bd57fc27dd2e296ea58ba1cdaae421a6a0e4e96edcdda61bc0322dee7395464410e66ad088c18a3a024f542571eeafe4f970e621887fac9cfc335