Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 19:25
Static task
static1
Behavioral task
behavioral1
Sample
6beb38b23964322e9fcc881ef51e7819.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6beb38b23964322e9fcc881ef51e7819.exe
Resource
win10v2004-20220812-en
General
-
Target
6beb38b23964322e9fcc881ef51e7819.exe
-
Size
408KB
-
MD5
6beb38b23964322e9fcc881ef51e7819
-
SHA1
71277568877c51cbb7a741a21cf96fc2e18d9e18
-
SHA256
85cfd8c4a34c7552ab58def454a0a286195f0522238406e4ab40e39724194c7a
-
SHA512
93b9d0ef14d9bf0437936f1c83c3b028e767c9a95287e4d7eaf6d32d123e91cd47dbf15c9f6735378752c4523cba530ca949b7f3b780fe31007886bd612f77df
-
SSDEEP
12288:4XgvmzFHi0mo5aH0qMzd58+7FksPJQPDHvd:4XgvOHi0mGaH0qSdlFkG4V
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" viltvem.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" viltvem.exe -
Adds policy Run key to start application 2 TTPs 25 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "iiytiezylgsedcftewee.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\byldpiawgyhqmiitb.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uqctewniriqytonx.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vujdrmgeqkvgecerbsz.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "vujdrmgeqkvgecerbsz.exe" 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "uqctewniriqytonx.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "kiwpcwpmxqakhefraq.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iiytiezylgsedcftewee.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "vujdrmgeqkvgecerbsz.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xyplbyuuiereeeixjclmd.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "iiytiezylgsedcftewee.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iiytiezylgsedcftewee.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "uqctewniriqytonx.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "xyplbyuuiereeeixjclmd.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\byldpiawgyhqmiitb.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\byldpiawgyhqmiitb.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "byldpiawgyhqmiitb.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vujdrmgeqkvgecerbsz.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\memzguhydquy = "kiwpcwpmxqakhefraq.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bqvfjuesu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uqctewniriqytonx.exe" viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run viltvem.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" viltvem.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" viltvem.exe -
Executes dropped EXE 2 IoCs
pid Process 3048 viltvem.exe 632 viltvem.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 6beb38b23964322e9fcc881ef51e7819.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vujdrmgeqkvgecerbsz.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "uqctewniriqytonx.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "vujdrmgeqkvgecerbsz.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pkvlvmcweubicwu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xyplbyuuiereeeixjclmd.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "iiytiezylgsedcftewee.exe" viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vujdrmgeqkvgecerbsz.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uqctewniriqytonx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vujdrmgeqkvgecerbsz.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uqctewniriqytonx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uqctewniriqytonx.exe" viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uqctewniriqytonx.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uqctewniriqytonx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iiytiezylgsedcftewee.exe" viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe ." 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mgqfoetmtioung = "kiwpcwpmxqakhefraq.exe ." viltvem.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "iiytiezylgsedcftewee.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "vujdrmgeqkvgecerbsz.exe" viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mgqfoetmtioung = "vujdrmgeqkvgecerbsz.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uqctewniriqytonx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iiytiezylgsedcftewee.exe" viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mgqfoetmtioung = "xyplbyuuiereeeixjclmd.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uqctewniriqytonx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\byldpiawgyhqmiitb.exe" viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\byldpiawgyhqmiitb.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pkvlvmcweubicwu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iiytiezylgsedcftewee.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe" viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mgqfoetmtioung = "byldpiawgyhqmiitb.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pkvlvmcweubicwu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "vujdrmgeqkvgecerbsz.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xyplbyuuiereeeixjclmd.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\byldpiawgyhqmiitb.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "byldpiawgyhqmiitb.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uqctewniriqytonx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe" viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce viltvem.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pkvlvmcweubicwu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\byldpiawgyhqmiitb.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "byldpiawgyhqmiitb.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pkvlvmcweubicwu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiwpcwpmxqakhefraq.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mgqfoetmtioung = "kiwpcwpmxqakhefraq.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pkvlvmcweubicwu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uqctewniriqytonx.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lenbjymekydia = "kiwpcwpmxqakhefraq.exe" viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\byldpiawgyhqmiitb.exe" viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lenbjymekydia = "uqctewniriqytonx.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "xyplbyuuiereeeixjclmd.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iiytiezylgsedcftewee.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "byldpiawgyhqmiitb.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xyplbyuuiereeeixjclmd.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "vujdrmgeqkvgecerbsz.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "xyplbyuuiereeeixjclmd.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uqctewniriqytonx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uqctewniriqytonx.exe" 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "uqctewniriqytonx.exe ." viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uqctewniriqytonx.exe ." 6beb38b23964322e9fcc881ef51e7819.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lenbjymekydia = "byldpiawgyhqmiitb.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "iiytiezylgsedcftewee.exe" viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lenbjymekydia = "uqctewniriqytonx.exe" viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "kiwpcwpmxqakhefraq.exe" viltvem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iiytiezylgsedcftewee.exe ." viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pgnzfseuykn = "uqctewniriqytonx.exe ." viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce viltvem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukqbgsdsvg = "uqctewniriqytonx.exe" viltvem.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6beb38b23964322e9fcc881ef51e7819.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" viltvem.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" viltvem.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 whatismyip.everdot.org 15 whatismyipaddress.com 18 www.showmyipaddress.com 26 whatismyip.everdot.org -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ckilimpwruoipwhdwwmusvsw.gbe viltvem.exe File created C:\Windows\SysWOW64\ckilimpwruoipwhdwwmusvsw.gbe viltvem.exe File opened for modification C:\Windows\SysWOW64\lenbjymekydiasovzklenbjymekydiasovz.len viltvem.exe File created C:\Windows\SysWOW64\lenbjymekydiasovzklenbjymekydiasovz.len viltvem.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\lenbjymekydiasovzklenbjymekydiasovz.len viltvem.exe File created C:\Program Files (x86)\lenbjymekydiasovzklenbjymekydiasovz.len viltvem.exe File opened for modification C:\Program Files (x86)\ckilimpwruoipwhdwwmusvsw.gbe viltvem.exe File created C:\Program Files (x86)\ckilimpwruoipwhdwwmusvsw.gbe viltvem.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\ckilimpwruoipwhdwwmusvsw.gbe viltvem.exe File opened for modification C:\Windows\lenbjymekydiasovzklenbjymekydiasovz.len viltvem.exe File created C:\Windows\lenbjymekydiasovzklenbjymekydiasovz.len viltvem.exe File opened for modification C:\Windows\ckilimpwruoipwhdwwmusvsw.gbe viltvem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings viltvem.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings viltvem.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe 3048 viltvem.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 632 viltvem.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3048 viltvem.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1604 wrote to memory of 3048 1604 6beb38b23964322e9fcc881ef51e7819.exe 85 PID 1604 wrote to memory of 3048 1604 6beb38b23964322e9fcc881ef51e7819.exe 85 PID 1604 wrote to memory of 3048 1604 6beb38b23964322e9fcc881ef51e7819.exe 85 PID 1604 wrote to memory of 632 1604 6beb38b23964322e9fcc881ef51e7819.exe 86 PID 1604 wrote to memory of 632 1604 6beb38b23964322e9fcc881ef51e7819.exe 86 PID 1604 wrote to memory of 632 1604 6beb38b23964322e9fcc881ef51e7819.exe 86 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6beb38b23964322e9fcc881ef51e7819.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 6beb38b23964322e9fcc881ef51e7819.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" viltvem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" viltvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer viltvem.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6beb38b23964322e9fcc881ef51e7819.exe"C:\Users\Admin\AppData\Local\Temp\6beb38b23964322e9fcc881ef51e7819.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\viltvem.exe"C:\Users\Admin\AppData\Local\Temp\viltvem.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\viltvem.exe"C:\Users\Admin\AppData\Local\Temp\viltvem.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:632
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD5a8427d2ac070322b517b804eef7d436a
SHA12d35c0b497def6333a9f70710270073c6a6fe0d6
SHA256a89f454c24da2e5492889294de01afeebe5b75a102a94a5c3b676705cfe30dfd
SHA51242a5025a516c39cca0ae1c3acc8c974bc733ec634935931463ab35ad86c2469a7b4433477160d7fbd33c367c1ccc3bf4c6a5c3bcaa01481abced9129fcff58f6
-
Filesize
808KB
MD5a8427d2ac070322b517b804eef7d436a
SHA12d35c0b497def6333a9f70710270073c6a6fe0d6
SHA256a89f454c24da2e5492889294de01afeebe5b75a102a94a5c3b676705cfe30dfd
SHA51242a5025a516c39cca0ae1c3acc8c974bc733ec634935931463ab35ad86c2469a7b4433477160d7fbd33c367c1ccc3bf4c6a5c3bcaa01481abced9129fcff58f6
-
Filesize
808KB
MD5a8427d2ac070322b517b804eef7d436a
SHA12d35c0b497def6333a9f70710270073c6a6fe0d6
SHA256a89f454c24da2e5492889294de01afeebe5b75a102a94a5c3b676705cfe30dfd
SHA51242a5025a516c39cca0ae1c3acc8c974bc733ec634935931463ab35ad86c2469a7b4433477160d7fbd33c367c1ccc3bf4c6a5c3bcaa01481abced9129fcff58f6