Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe
Resource
win10v2004-20220812-en
General
-
Target
fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe
-
Size
320KB
-
MD5
dfcd3efd5082839ae8b8ad90d9bcacd6
-
SHA1
56678944830d3e771383b592c6b61e34b6d55487
-
SHA256
fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61
-
SHA512
dd5a901ae879f5c4ad2e33820c91610bbd052ba9c53b88ac834cd894f2286308b92b050e29e6238cbba3cca304f4f11d4b2ecb0487f3d47ad2d3dca561696b46
-
SSDEEP
6144:wTw4o1IV3puaibGKFHi0mofhaH05kipz016580bHFMWu86JQPDHDdx/QtqR:+mgvmzFHi0mo5aH0qMzd5807FKPJQPDV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" benly.exe -
Adds policy Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fupzyodrgygxdxbbd.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "mecprkctlgrlurybgfia.exe" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ymgpncqdripfkdgf.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mecprkctlgrlurybgfia.exe" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "fupzyodrgygxdxbbd.exe" benly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run benly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "ymgpncqdripfkdgf.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "fupzyodrgygxdxbbd.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "oeallcshxqzrytyzcz.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "buthkexpieqlvtbfllpih.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mecprkctlgrlurybgfia.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\buthkexpieqlvtbfllpih.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fupzyodrgygxdxbbd.exe" benly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "ymgpncqdripfkdgf.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "oeallcshxqzrytyzcz.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ymgpncqdripfkdgf.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "buthkexpieqlvtbfllpih.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\yguxpygnvg = "zqnzasjzqkunvrxzdbd.exe" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zeppekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mecprkctlgrlurybgfia.exe" benly.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" benly.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" benly.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" benly.exe -
Executes dropped EXE 2 IoCs
pid Process 3320 benly.exe 8 benly.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mecprkctlgrlurybgfia.exe" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oughxekp = "oeallcshxqzrytyzcz.exe" benly.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\parxsepzkycpr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ymgpncqdripfkdgf.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qcubxkwhtinbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\buthkexpieqlvtbfllpih.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tcrvoyhpykm = "ymgpncqdripfkdgf.exe" benly.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oughxekp = "zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fupzyodrgygxdxbbd.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqnzasjzqkunvrxzdbd.exe ." benly.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqnzasjzqkunvrxzdbd.exe" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oughxekp = "buthkexpieqlvtbfllpih.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\parxsepzkycpr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\buthkexpieqlvtbfllpih.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "buthkexpieqlvtbfllpih.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qaqvpaktdqtf = "ymgpncqdripfkdgf.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qcubxkwhtinbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fupzyodrgygxdxbbd.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qaqvpaktdqtf = "oeallcshxqzrytyzcz.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qcubxkwhtinbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\parxsepzkycpr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oughxekp = "mecprkctlgrlurybgfia.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\parxsepzkycpr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqnzasjzqkunvrxzdbd.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qaqvpaktdqtf = "zqnzasjzqkunvrxzdbd.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qaqvpaktdqtf = "mecprkctlgrlurybgfia.exe ." fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qcubxkwhtinbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fupzyodrgygxdxbbd.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "ymgpncqdripfkdgf.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qcubxkwhtinbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mecprkctlgrlurybgfia.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "ymgpncqdripfkdgf.exe ." fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tcrvoyhpykm = "buthkexpieqlvtbfllpih.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\parxsepzkycpr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ymgpncqdripfkdgf.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tcrvoyhpykm = "zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tcrvoyhpykm = "buthkexpieqlvtbfllpih.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tcrvoyhpykm = "fupzyodrgygxdxbbd.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qaqvpaktdqtf = "oeallcshxqzrytyzcz.exe ." benly.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fupzyodrgygxdxbbd.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oughxekp = "zqnzasjzqkunvrxzdbd.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ymgpncqdripfkdgf.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qcubxkwhtinbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tcrvoyhpykm = "mecprkctlgrlurybgfia.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ymgpncqdripfkdgf.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\buthkexpieqlvtbfllpih.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fupzyodrgygxdxbbd.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oughxekp = "ymgpncqdripfkdgf.exe" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "oeallcshxqzrytyzcz.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mecprkctlgrlurybgfia.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ymgpncqdripfkdgf.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qaqvpaktdqtf = "fupzyodrgygxdxbbd.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "zqnzasjzqkunvrxzdbd.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tcrvoyhpykm = "ymgpncqdripfkdgf.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "buthkexpieqlvtbfllpih.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tcrvoyhpykm = "buthkexpieqlvtbfllpih.exe" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oughxekp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe" benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fmzbsahnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fupzyodrgygxdxbbd.exe ." benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oughxekp = "mecprkctlgrlurybgfia.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oughxekp = "ymgpncqdripfkdgf.exe" benly.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\parxsepzkycpr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oeallcshxqzrytyzcz.exe ." benly.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qaqvpaktdqtf = "mecprkctlgrlurybgfia.exe ." benly.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" benly.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" benly.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA benly.exe -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 www.showmyipaddress.com 17 whatismyip.everdot.org 21 whatismyipaddress.com 41 www.showmyipaddress.com 43 whatismyipaddress.com 59 whatismyip.everdot.org -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\benlycfhkqmrltlzpznqzxkortw.ydx benly.exe File created C:\Windows\SysWOW64\benlycfhkqmrltlzpznqzxkortw.ydx benly.exe File opened for modification C:\Windows\SysWOW64\ymgpncqdripfkdgfgbaoirpesftkrhmfihidcq.trg benly.exe File created C:\Windows\SysWOW64\ymgpncqdripfkdgfgbaoirpesftkrhmfihidcq.trg benly.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\benlycfhkqmrltlzpznqzxkortw.ydx benly.exe File created C:\Program Files (x86)\benlycfhkqmrltlzpznqzxkortw.ydx benly.exe File opened for modification C:\Program Files (x86)\ymgpncqdripfkdgfgbaoirpesftkrhmfihidcq.trg benly.exe File created C:\Program Files (x86)\ymgpncqdripfkdgfgbaoirpesftkrhmfihidcq.trg benly.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\benlycfhkqmrltlzpznqzxkortw.ydx benly.exe File created C:\Windows\benlycfhkqmrltlzpznqzxkortw.ydx benly.exe File opened for modification C:\Windows\ymgpncqdripfkdgfgbaoirpesftkrhmfihidcq.trg benly.exe File created C:\Windows\ymgpncqdripfkdgfgbaoirpesftkrhmfihidcq.trg benly.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings benly.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings benly.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe 3320 benly.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 8 benly.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3320 benly.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3320 2572 fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe 80 PID 2572 wrote to memory of 3320 2572 fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe 80 PID 2572 wrote to memory of 3320 2572 fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe 80 PID 2572 wrote to memory of 8 2572 fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe 81 PID 2572 wrote to memory of 8 2572 fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe 81 PID 2572 wrote to memory of 8 2572 fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe 81 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" benly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer benly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" benly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" benly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" benly.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" benly.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe"C:\Users\Admin\AppData\Local\Temp\fa6bf02d1da363992191fa1003bb9e1c6d7e61de1d798a99652d759e11d2ac61.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\benly.exe"C:\Users\Admin\AppData\Local\Temp\benly.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\benly.exe"C:\Users\Admin\AppData\Local\Temp\benly.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:8
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720KB
MD597425ec9907034f074a33184ca2d3ada
SHA142c61043112ae313cf20be5f97f8a80efe39ad8b
SHA256d005ed1fa759d1c7392e5a5965684f00a846b732ff51a1cf39ef260049276684
SHA51216a1ed6ea03a02202c94414036307ff23494756f745669cb982fd65b2c60572493fee8adbf4d4daf5a3e1632a94ed8e99fc2494c0514a7452b346fd5aebda6b6
-
Filesize
720KB
MD597425ec9907034f074a33184ca2d3ada
SHA142c61043112ae313cf20be5f97f8a80efe39ad8b
SHA256d005ed1fa759d1c7392e5a5965684f00a846b732ff51a1cf39ef260049276684
SHA51216a1ed6ea03a02202c94414036307ff23494756f745669cb982fd65b2c60572493fee8adbf4d4daf5a3e1632a94ed8e99fc2494c0514a7452b346fd5aebda6b6
-
Filesize
720KB
MD597425ec9907034f074a33184ca2d3ada
SHA142c61043112ae313cf20be5f97f8a80efe39ad8b
SHA256d005ed1fa759d1c7392e5a5965684f00a846b732ff51a1cf39ef260049276684
SHA51216a1ed6ea03a02202c94414036307ff23494756f745669cb982fd65b2c60572493fee8adbf4d4daf5a3e1632a94ed8e99fc2494c0514a7452b346fd5aebda6b6