Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe
Resource
win7-20220812-en
General
-
Target
f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe
-
Size
877KB
-
MD5
6363aad0fbfdfa08323a3f6cfe321440
-
SHA1
a7f6763bfb0c2b8a054493c409ac229f3cbb5717
-
SHA256
f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83
-
SHA512
67c018b7dd4a946ec07e8cc0607a44c371d4a8318df258dc8d2e5a2b145f0a96ec88d193157002d183aee093bd821b919919b661652a8731944bfd0c24f6941e
-
SSDEEP
1536:/YlgdBR/zfjtgs0vyQhYxfQpY6wsMYk2bY0jMjx+J1gxvV3JrwRJ9qMnpvs:8QPjRgqMMQtMYM0+AQxvVmQ0p
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" 17D68E.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 17D68E.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 17D68E.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 17D68E.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\34DD89516BF21FC7\17D68E.exe = "C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe:*:Enabled:@xpsp2res.dll,-28956246" 17D68E.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 17D68E.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\34DD89516BF21FC7\17D68E.exe = "C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe:*:Enabled:@xpsp2res.dll,-70554750" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\34DD89516BF21FC7\17D68E.exe = "C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe:*:Enabled:@xpsp2res.dll,-53342401" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\34DD89516BF21FC7\17D68E.exe = "C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe:*:Enabled:@xpsp2res.dll,-57951861" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 17D68E.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 17D68E.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" 17D68E.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" 17D68E.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 17D68E.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 17D68E.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" 17D68E.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 17D68E.exe -
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 17D68E.exe -
Executes dropped EXE 2 IoCs
pid Process 1804 17D68E.exe 1724 17D68E.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fix-it.exe 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav530stbyb.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icmoon.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\w32dsm89.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winrecon.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DllNXOptions 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cleaner3.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explored.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleToolbarInstaller_download_signed.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ndntspst.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ifw2000.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lsetup.exe 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvsvc32.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsbgate.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swxcacls.exe 17D68E.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IEUNATT.EXE 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alertsvc.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bd_professional.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfeann.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qserver.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sd.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbwin9x.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsscan40.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wfindv32.exe 17D68E.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OSE.EXE 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iface.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\norton_internet_secu_3.0_407.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2servic.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\localnet.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavproxy.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Opera_964_int_Setup.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\poproxy.exe 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zapsetup3001.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\unzip.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zonealarm.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmlisten.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\clamauto.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SbieSvc.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntxconfig.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcip10117_0.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\whoswatchingme.exe 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfagent.exe 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pview.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webtrap.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsm32.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iamstats.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\killprocesssetup161.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symtray.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmnhdlr.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpftray.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rshell.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpc32.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regmon.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlh.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ahnsd.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scrscan.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\virusmdpersonalfirewall.exe 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csinject.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\edi.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanh95.exe 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mxtask.exe\Debugger = "\"C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapw32.exe 17D68E.exe -
resource yara_rule behavioral1/memory/1476-57-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1476-59-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1476-60-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1476-63-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1476-64-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1476-68-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1476-73-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1724-90-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1724-92-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Anytime Upgrade.exe 17D68E.exe -
Loads dropped DLL 2 IoCs
pid Process 1476 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 1476 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\cval = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring 17D68E.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\B9373D14A02BC13F1345A3F7BC53B8BCC98D3B04DD0CD9CF = "C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe" 17D68E.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run 17D68E.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\E50B29BAACAA360FCC344254003743208BA6735D23877EED = "C:\\Users\\Admin\\34DD89516BF21FC7\\17D68E.exe" 17D68E.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 17D68E.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 17D68E.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1504 set thread context of 1476 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 26 PID 1804 set thread context of 1724 1804 17D68E.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\Sound\Beep = "no" 17D68E.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Control Panel\Sound 17D68E.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://9z8oxe9pe1597dh.directorio-w.com" 17D68E.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 17D68E.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" 17D68E.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page = "http://5cisy89191o4scg.directorio-w.com" 17D68E.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://mek22ztz138u636.directorio-w.com" 17D68E.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main 17D68E.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Local Page = "http://c5hz936515n2xu6.directorio-w.com" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://4z47az5aifblk90.directorio-w.com" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://bw62ei3z651xlg9.directorio-w.com" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://6ki63w304ngd283.directorio-w.com" 17D68E.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Download 17D68E.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://7dt5pahyg0bu59g.directorio-w.com" 17D68E.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 17D68E.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" 17D68E.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://27603vws3m8tga3.directorio-w.com" 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://914gu00424dung0.directorio-w.com" 17D68E.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec 17D68E.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell 17D68E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open 17D68E.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 17D68E.exe 1724 17D68E.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 1724 17D68E.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 1476 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 1804 17D68E.exe 1724 17D68E.exe 1724 17D68E.exe 1724 17D68E.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1476 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 26 PID 1504 wrote to memory of 1476 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 26 PID 1504 wrote to memory of 1476 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 26 PID 1504 wrote to memory of 1476 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 26 PID 1504 wrote to memory of 1476 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 26 PID 1504 wrote to memory of 1476 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 26 PID 1504 wrote to memory of 1476 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 26 PID 1504 wrote to memory of 1476 1504 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 26 PID 1476 wrote to memory of 1804 1476 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 27 PID 1476 wrote to memory of 1804 1476 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 27 PID 1476 wrote to memory of 1804 1476 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 27 PID 1476 wrote to memory of 1804 1476 f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe 27 PID 1804 wrote to memory of 1724 1804 17D68E.exe 28 PID 1804 wrote to memory of 1724 1804 17D68E.exe 28 PID 1804 wrote to memory of 1724 1804 17D68E.exe 28 PID 1804 wrote to memory of 1724 1804 17D68E.exe 28 PID 1804 wrote to memory of 1724 1804 17D68E.exe 28 PID 1804 wrote to memory of 1724 1804 17D68E.exe 28 PID 1804 wrote to memory of 1724 1804 17D68E.exe 28 PID 1804 wrote to memory of 1724 1804 17D68E.exe 28 PID 1724 wrote to memory of 1396 1724 17D68E.exe 15 PID 1724 wrote to memory of 1396 1724 17D68E.exe 15 PID 1724 wrote to memory of 1396 1724 17D68E.exe 15 PID 1724 wrote to memory of 1396 1724 17D68E.exe 15 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" 17D68E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 17D68E.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe"C:\Users\Admin\AppData\Local\Temp\f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe"C:\Users\Admin\AppData\Local\Temp\f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\34DD89516BF21FC7\17D68E.exe"C:\Users\Admin\34DD89516BF21FC7\17D68E.exe" 81DCBA754⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\34DD89516BF21FC7\17D68E.exe"C:\Users\Admin\34DD89516BF21FC7\17D68E.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1724
-
-
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
877KB
MD56363aad0fbfdfa08323a3f6cfe321440
SHA1a7f6763bfb0c2b8a054493c409ac229f3cbb5717
SHA256f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83
SHA51267c018b7dd4a946ec07e8cc0607a44c371d4a8318df258dc8d2e5a2b145f0a96ec88d193157002d183aee093bd821b919919b661652a8731944bfd0c24f6941e
-
Filesize
877KB
MD56363aad0fbfdfa08323a3f6cfe321440
SHA1a7f6763bfb0c2b8a054493c409ac229f3cbb5717
SHA256f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83
SHA51267c018b7dd4a946ec07e8cc0607a44c371d4a8318df258dc8d2e5a2b145f0a96ec88d193157002d183aee093bd821b919919b661652a8731944bfd0c24f6941e
-
Filesize
877KB
MD56363aad0fbfdfa08323a3f6cfe321440
SHA1a7f6763bfb0c2b8a054493c409ac229f3cbb5717
SHA256f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83
SHA51267c018b7dd4a946ec07e8cc0607a44c371d4a8318df258dc8d2e5a2b145f0a96ec88d193157002d183aee093bd821b919919b661652a8731944bfd0c24f6941e
-
Filesize
877KB
MD56363aad0fbfdfa08323a3f6cfe321440
SHA1a7f6763bfb0c2b8a054493c409ac229f3cbb5717
SHA256f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83
SHA51267c018b7dd4a946ec07e8cc0607a44c371d4a8318df258dc8d2e5a2b145f0a96ec88d193157002d183aee093bd821b919919b661652a8731944bfd0c24f6941e
-
Filesize
877KB
MD56363aad0fbfdfa08323a3f6cfe321440
SHA1a7f6763bfb0c2b8a054493c409ac229f3cbb5717
SHA256f1e4f74a68eefb552437406fd3cceec335e82a131e2d7a0a4c7986075f434c83
SHA51267c018b7dd4a946ec07e8cc0607a44c371d4a8318df258dc8d2e5a2b145f0a96ec88d193157002d183aee093bd821b919919b661652a8731944bfd0c24f6941e