Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe
Resource
win10v2004-20220812-en
General
-
Target
8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe
-
Size
1016KB
-
MD5
806813ee8fd000977577e8f3f316e650
-
SHA1
e6e6d51eacc9e5ce5528829df7cb0e36e542d065
-
SHA256
8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
-
SHA512
cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
SSDEEP
6144:EIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHU:EIXsgtvm1De5YlOx6lzBH46U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ntxams.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ntxams.exe -
Adds policy Run key to start application 2 TTPs 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qdoyrepzrhmbg = "phxmkcshezjdnmbvuj.exe" ntxams.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qdoyrepzrhmbg = "atkazsjzxtezkkavvle.exe" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ntxams.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qdoyrepzrhmbg = "nhzqqkctspbxjkbxypjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zjryoygncp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxqijexppnaxkmebdvqjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qdoyrepzrhmbg = "atkazsjzxtezkkavvle.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qdoyrepzrhmbg = "gxmaxodrnhqjsqexv.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zjryoygncp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhzqqkctspbxjkbxypjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qdoyrepzrhmbg = "cxqijexppnaxkmebdvqjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zjryoygncp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxqijexppnaxkmebdvqjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zjryoygncp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxqijexppnaxkmebdvqjb.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qdoyrepzrhmbg = "atkazsjzxtezkkavvle.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zjryoygncp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gxmaxodrnhqjsqexv.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zjryoygncp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\atkazsjzxtezkkavvle.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qdoyrepzrhmbg = "gxmaxodrnhqjsqexv.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zjryoygncp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gxmaxodrnhqjsqexv.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qdoyrepzrhmbg = "zpdqmcqdyrzrzwjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zjryoygncp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\phxmkcshezjdnmbvuj.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zjryoygncp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zpdqmcqdyrzrzwjb.exe" ntxams.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yborjrewily.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ntxams.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ntxams.exe -
Executes dropped EXE 3 IoCs
pid Process 4264 yborjrewily.exe 4324 ntxams.exe 1112 ntxams.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation yborjrewily.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ujwidsfrldkbieq = "phxmkcshezjdnmbvuj.exe ." yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gxmaxodrnhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\atkazsjzxtezkkavvle.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gxmaxodrnhqjsqexv.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\atkazsjzxtezkkavvle.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ujwidsfrldkbieq = "gxmaxodrnhqjsqexv.exe ." ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gxmaxodrnhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gxmaxodrnhqjsqexv.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zpdqmcqdyrzrzwjb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\atkazsjzxtezkkavvle.exe ." ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "gxmaxodrnhqjsqexv.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ujwidsfrldkbieq = "gxmaxodrnhqjsqexv.exe ." ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zpdqmcqdyrzrzwjb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gxmaxodrnhqjsqexv.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\phxmkcshezjdnmbvuj.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rfrcwkwharxnto = "nhzqqkctspbxjkbxypjb.exe" yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rfrcwkwharxnto = "cxqijexppnaxkmebdvqjb.exe" ntxams.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yborjrewily.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rfrcwkwharxnto = "phxmkcshezjdnmbvuj.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "cxqijexppnaxkmebdvqjb.exe" ntxams.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rfrcwkwharxnto = "nhzqqkctspbxjkbxypjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "zpdqmcqdyrzrzwjb.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ujwidsfrldkbieq = "phxmkcshezjdnmbvuj.exe ." ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "gxmaxodrnhqjsqexv.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zpdqmcqdyrzrzwjb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhzqqkctspbxjkbxypjb.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhzqqkctspbxjkbxypjb.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rfrcwkwharxnto = "zpdqmcqdyrzrzwjb.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxqijexppnaxkmebdvqjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gxmaxodrnhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\phxmkcshezjdnmbvuj.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "atkazsjzxtezkkavvle.exe ." yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "phxmkcshezjdnmbvuj.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rfrcwkwharxnto = "zpdqmcqdyrzrzwjb.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxqijexppnaxkmebdvqjb.exe ." yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gxmaxodrnhqjsqexv.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gxmaxodrnhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhzqqkctspbxjkbxypjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "zpdqmcqdyrzrzwjb.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhzqqkctspbxjkbxypjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "cxqijexppnaxkmebdvqjb.exe ." ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gxmaxodrnhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zpdqmcqdyrzrzwjb.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxqijexppnaxkmebdvqjb.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zpdqmcqdyrzrzwjb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zpdqmcqdyrzrzwjb.exe ." yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "nhzqqkctspbxjkbxypjb.exe" ntxams.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ujwidsfrldkbieq = "zpdqmcqdyrzrzwjb.exe ." ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gxmaxodrnhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\phxmkcshezjdnmbvuj.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gxmaxodrnhqjsqexv.exe ." ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "atkazsjzxtezkkavvle.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ujwidsfrldkbieq = "cxqijexppnaxkmebdvqjb.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\atkazsjzxtezkkavvle.exe ." ntxams.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zpdqmcqdyrzrzwjb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gxmaxodrnhqjsqexv.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ujwidsfrldkbieq = "nhzqqkctspbxjkbxypjb.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxqijexppnaxkmebdvqjb.exe ." ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gxmaxodrnhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhzqqkctspbxjkbxypjb.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\atkazsjzxtezkkavvle.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "atkazsjzxtezkkavvle.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zpdqmcqdyrzrzwjb.exe" ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ufownyhpftw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\atkazsjzxtezkkavvle.exe" yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ujwidsfrldkbieq = "atkazsjzxtezkkavvle.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhzqqkctspbxjkbxypjb.exe ." ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zpdqmcqdyrzrzwjb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxqijexppnaxkmebdvqjb.exe ." ntxams.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rfrcwkwharxnto = "phxmkcshezjdnmbvuj.exe" ntxams.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rdnwoaktkzdr = "gxmaxodrnhqjsqexv.exe ." ntxams.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce yborjrewily.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ntxams.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ntxams.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yborjrewily.exe -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 whatismyipaddress.com 60 whatismyip.everdot.org 15 www.showmyipaddress.com 22 whatismyipaddress.com 29 whatismyip.everdot.org 46 www.showmyipaddress.com -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\txzakoqrahdjfqrxijnpqaeghq.tzv ntxams.exe File created C:\Windows\SysWOW64\txzakoqrahdjfqrxijnpqaeghq.tzv ntxams.exe File opened for modification C:\Windows\SysWOW64\ujwidsfrldkbieqhdperdynamgyfwdzlcykzm.tiv ntxams.exe File opened for modification C:\Windows\SysWOW64\zpdqmcqdyrzrzwjb.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\phxmkcshezjdnmbvuj.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\nhzqqkctspbxjkbxypjb.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\cxqijexppnaxkmebdvqjb.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\zpdqmcqdyrzrzwjb.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\atkazsjzxtezkkavvle.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\tpjceaunonbznqjhkdztmo.exe ntxams.exe File created C:\Windows\SysWOW64\ujwidsfrldkbieqhdperdynamgyfwdzlcykzm.tiv ntxams.exe File opened for modification C:\Windows\SysWOW64\gxmaxodrnhqjsqexv.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\zpdqmcqdyrzrzwjb.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\phxmkcshezjdnmbvuj.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\phxmkcshezjdnmbvuj.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\cxqijexppnaxkmebdvqjb.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\gxmaxodrnhqjsqexv.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\tpjceaunonbznqjhkdztmo.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\atkazsjzxtezkkavvle.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\tpjceaunonbznqjhkdztmo.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\gxmaxodrnhqjsqexv.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\nhzqqkctspbxjkbxypjb.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\cxqijexppnaxkmebdvqjb.exe ntxams.exe File opened for modification C:\Windows\SysWOW64\atkazsjzxtezkkavvle.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\nhzqqkctspbxjkbxypjb.exe yborjrewily.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\txzakoqrahdjfqrxijnpqaeghq.tzv ntxams.exe File opened for modification C:\Program Files (x86)\ujwidsfrldkbieqhdperdynamgyfwdzlcykzm.tiv ntxams.exe File created C:\Program Files (x86)\ujwidsfrldkbieqhdperdynamgyfwdzlcykzm.tiv ntxams.exe File opened for modification C:\Program Files (x86)\txzakoqrahdjfqrxijnpqaeghq.tzv ntxams.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\gxmaxodrnhqjsqexv.exe ntxams.exe File opened for modification C:\Windows\tpjceaunonbznqjhkdztmo.exe ntxams.exe File created C:\Windows\ujwidsfrldkbieqhdperdynamgyfwdzlcykzm.tiv ntxams.exe File opened for modification C:\Windows\tpjceaunonbznqjhkdztmo.exe yborjrewily.exe File opened for modification C:\Windows\tpjceaunonbznqjhkdztmo.exe ntxams.exe File opened for modification C:\Windows\gxmaxodrnhqjsqexv.exe ntxams.exe File opened for modification C:\Windows\phxmkcshezjdnmbvuj.exe ntxams.exe File opened for modification C:\Windows\atkazsjzxtezkkavvle.exe ntxams.exe File opened for modification C:\Windows\cxqijexppnaxkmebdvqjb.exe ntxams.exe File opened for modification C:\Windows\nhzqqkctspbxjkbxypjb.exe yborjrewily.exe File opened for modification C:\Windows\zpdqmcqdyrzrzwjb.exe ntxams.exe File opened for modification C:\Windows\cxqijexppnaxkmebdvqjb.exe yborjrewily.exe File opened for modification C:\Windows\atkazsjzxtezkkavvle.exe ntxams.exe File opened for modification C:\Windows\nhzqqkctspbxjkbxypjb.exe ntxams.exe File opened for modification C:\Windows\cxqijexppnaxkmebdvqjb.exe ntxams.exe File opened for modification C:\Windows\zpdqmcqdyrzrzwjb.exe ntxams.exe File opened for modification C:\Windows\nhzqqkctspbxjkbxypjb.exe ntxams.exe File opened for modification C:\Windows\gxmaxodrnhqjsqexv.exe yborjrewily.exe File opened for modification C:\Windows\atkazsjzxtezkkavvle.exe yborjrewily.exe File opened for modification C:\Windows\ujwidsfrldkbieqhdperdynamgyfwdzlcykzm.tiv ntxams.exe File opened for modification C:\Windows\phxmkcshezjdnmbvuj.exe ntxams.exe File opened for modification C:\Windows\txzakoqrahdjfqrxijnpqaeghq.tzv ntxams.exe File created C:\Windows\txzakoqrahdjfqrxijnpqaeghq.tzv ntxams.exe File opened for modification C:\Windows\zpdqmcqdyrzrzwjb.exe yborjrewily.exe File opened for modification C:\Windows\phxmkcshezjdnmbvuj.exe yborjrewily.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4324 ntxams.exe 4324 ntxams.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4324 ntxams.exe 4324 ntxams.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4324 ntxams.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4264 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 81 PID 4356 wrote to memory of 4264 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 81 PID 4356 wrote to memory of 4264 4356 8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe 81 PID 4264 wrote to memory of 4324 4264 yborjrewily.exe 85 PID 4264 wrote to memory of 4324 4264 yborjrewily.exe 85 PID 4264 wrote to memory of 4324 4264 yborjrewily.exe 85 PID 4264 wrote to memory of 1112 4264 yborjrewily.exe 84 PID 4264 wrote to memory of 1112 4264 yborjrewily.exe 84 PID 4264 wrote to memory of 1112 4264 yborjrewily.exe 84 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ntxams.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ntxams.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ntxams.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ntxams.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ntxams.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yborjrewily.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe"C:\Users\Admin\AppData\Local\Temp\8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe"C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe" "c:\users\admin\appdata\local\temp\8e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\ntxams.exe"C:\Users\Admin\AppData\Local\Temp\ntxams.exe" "-C:\Users\Admin\AppData\Local\Temp\zpdqmcqdyrzrzwjb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\ntxams.exe"C:\Users\Admin\AppData\Local\Temp\ntxams.exe" "-C:\Users\Admin\AppData\Local\Temp\zpdqmcqdyrzrzwjb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4324
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
688KB
MD513b7895853e7a28d7ecc5c40455aac82
SHA1634f81189f494baa439aa47b868674ac652bb2cd
SHA256c4b13793a7283a72138219f424b67786fdf0561994736cf7f9e3663b24471f2d
SHA512660ae12392b41d42973a270de96a265910d8d9d7c52a976bb761afa1de59ab9d9940780a2db62241e6bb89884f72872764b68da2667d9e2fc30b38e5be989b66
-
Filesize
688KB
MD513b7895853e7a28d7ecc5c40455aac82
SHA1634f81189f494baa439aa47b868674ac652bb2cd
SHA256c4b13793a7283a72138219f424b67786fdf0561994736cf7f9e3663b24471f2d
SHA512660ae12392b41d42973a270de96a265910d8d9d7c52a976bb761afa1de59ab9d9940780a2db62241e6bb89884f72872764b68da2667d9e2fc30b38e5be989b66
-
Filesize
688KB
MD513b7895853e7a28d7ecc5c40455aac82
SHA1634f81189f494baa439aa47b868674ac652bb2cd
SHA256c4b13793a7283a72138219f424b67786fdf0561994736cf7f9e3663b24471f2d
SHA512660ae12392b41d42973a270de96a265910d8d9d7c52a976bb761afa1de59ab9d9940780a2db62241e6bb89884f72872764b68da2667d9e2fc30b38e5be989b66
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
320KB
MD5f606e0e958a9535dc50c6c624f13aa73
SHA1b9eef9f387d934a03d74cccd26069b059fa70475
SHA256930c87933fda52b4934cee66f57effb6391f04d9b7b3b45dbe48cb4af0a5115e
SHA512926064119d0bc45474b7e4157b25af9fc0159399ddd853cebe4b4b5f5a486b146d2456255f21dec2077b25d6e6e41ed9a8671d15b0d13f469d51a289dc88ca2b
-
Filesize
320KB
MD5f606e0e958a9535dc50c6c624f13aa73
SHA1b9eef9f387d934a03d74cccd26069b059fa70475
SHA256930c87933fda52b4934cee66f57effb6391f04d9b7b3b45dbe48cb4af0a5115e
SHA512926064119d0bc45474b7e4157b25af9fc0159399ddd853cebe4b4b5f5a486b146d2456255f21dec2077b25d6e6e41ed9a8671d15b0d13f469d51a289dc88ca2b
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9
-
Filesize
1016KB
MD5806813ee8fd000977577e8f3f316e650
SHA1e6e6d51eacc9e5ce5528829df7cb0e36e542d065
SHA2568e90a589c41dfcbd1653803e6b50f8ba1eb9652c7ea049bbe1d5d7cc3c104ec4
SHA512cd7dcd534af89591f8030c5cdea4341570ed9599e5064d3564c4168d49bcf3027fd15883a1b35fdb8f703729f59a4c73aa7cf0bd557eb4f73d8142c7286023b9