Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe
Resource
win10v2004-20220901-en
General
-
Target
cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe
-
Size
504KB
-
MD5
43eaf4f250ffa09bab2b005d53f54240
-
SHA1
5d0319763f638a41c98bfcd212b2f0b811d4959b
-
SHA256
cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
-
SHA512
1a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
SSDEEP
12288:ygkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUgA:8xsKXa+hHyWseBgXA
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xilrxem.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xilrxem.exe -
Adds policy Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ogqdqetjsknyxl = "dylbriatfaguwnait.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ogqdqetjsknyxl = "dylbriatfaguwnait.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rgnxhserxmm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dylbriatfaguwnait.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rgnxhserxmm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqcrgwnfqkpcdtfm.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ogqdqetjsknyxl = "zypjdyurhgqiojambtnmd.exe" xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ogqdqetjsknyxl = "wqcrgwnfqkpcdtfm.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ogqdqetjsknyxl = "kiyrkezvkirinhxiwnge.exe" xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rgnxhserxmm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\miwnewpjwszorjxgsh.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ogqdqetjsknyxl = "wqcrgwnfqkpcdtfm.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rgnxhserxmm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xujbtmgbpmukohwgtjb.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rgnxhserxmm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dylbriatfaguwnait.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rgnxhserxmm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\miwnewpjwszorjxgsh.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ogqdqetjsknyxl = "miwnewpjwszorjxgsh.exe" xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ogqdqetjsknyxl = "dylbriatfaguwnait.exe" gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rgnxhserxmm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xujbtmgbpmukohwgtjb.exe" gokvcejrqyu.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gokvcejrqyu.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xilrxem.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xilrxem.exe -
Executes dropped EXE 3 IoCs
pid Process 596 gokvcejrqyu.exe 1188 xilrxem.exe 2036 xilrxem.exe -
Loads dropped DLL 6 IoCs
pid Process 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 596 gokvcejrqyu.exe 596 gokvcejrqyu.exe 596 gokvcejrqyu.exe 596 gokvcejrqyu.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\miwnewpjwszorjxgsh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dylbriatfaguwnait.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\miwnewpjwszorjxgsh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xujbtmgbpmukohwgtjb.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dylbriatfaguwnait = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dylbriatfaguwnait.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rkvjxmctdwammbm = "wqcrgwnfqkpcdtfm.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wqcrgwnfqkpcdtfm = "xujbtmgbpmukohwgtjb.exe ." xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run gokvcejrqyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiyrkezvkirinhxiwnge.exe ." gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zypjdyurhgqiojambtnmd.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wqcrgwnfqkpcdtfm = "kiyrkezvkirinhxiwnge.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\miwnewpjwszorjxgsh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zypjdyurhgqiojambtnmd.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wqcrgwnfqkpcdtfm = "zypjdyurhgqiojambtnmd.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "zypjdyurhgqiojambtnmd.exe ." gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "kiyrkezvkirinhxiwnge.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rkvjxmctdwammbm = "xujbtmgbpmukohwgtjb.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zypjdyurhgqiojambtnmd.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xujbtmgbpmukohwgtjb.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "kiyrkezvkirinhxiwnge.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rkvjxmctdwammbm = "miwnewpjwszorjxgsh.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "dylbriatfaguwnait.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqcrgwnfqkpcdtfm.exe" gokvcejrqyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "dylbriatfaguwnait.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dylbriatfaguwnait = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xujbtmgbpmukohwgtjb.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rkvjxmctdwammbm = "zypjdyurhgqiojambtnmd.exe" gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wqcrgwnfqkpcdtfm = "xujbtmgbpmukohwgtjb.exe ." gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dylbriatfaguwnait = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqcrgwnfqkpcdtfm.exe ." gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xujbtmgbpmukohwgtjb.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\miwnewpjwszorjxgsh.exe" xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rkvjxmctdwammbm = "dylbriatfaguwnait.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wqcrgwnfqkpcdtfm = "zypjdyurhgqiojambtnmd.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiyrkezvkirinhxiwnge.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dylbriatfaguwnait = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zypjdyurhgqiojambtnmd.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "zypjdyurhgqiojambtnmd.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\miwnewpjwszorjxgsh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqcrgwnfqkpcdtfm.exe" xilrxem.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "zypjdyurhgqiojambtnmd.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xujbtmgbpmukohwgtjb.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\miwnewpjwszorjxgsh.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dylbriatfaguwnait = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dylbriatfaguwnait.exe ." xilrxem.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dylbriatfaguwnait = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xujbtmgbpmukohwgtjb.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "miwnewpjwszorjxgsh.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "miwnewpjwszorjxgsh.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wqcrgwnfqkpcdtfm = "dylbriatfaguwnait.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rkvjxmctdwammbm = "zypjdyurhgqiojambtnmd.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "zypjdyurhgqiojambtnmd.exe" gokvcejrqyu.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run gokvcejrqyu.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce xilrxem.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wqcrgwnfqkpcdtfm = "wqcrgwnfqkpcdtfm.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dylbriatfaguwnait.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dylbriatfaguwnait.exe ." xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wqcrgwnfqkpcdtfm = "kiyrkezvkirinhxiwnge.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\miwnewpjwszorjxgsh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiyrkezvkirinhxiwnge.exe" xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\miwnewpjwszorjxgsh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqcrgwnfqkpcdtfm.exe" xilrxem.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqcrgwnfqkpcdtfm.exe" xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oemxiuhvcstc = "kiyrkezvkirinhxiwnge.exe" xilrxem.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dylbriatfaguwnait = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kiyrkezvkirinhxiwnge.exe ." xilrxem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nenzlymbjacmk = "xujbtmgbpmukohwgtjb.exe ." xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce xilrxem.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gokvcejrqyu.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xilrxem.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xilrxem.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xilrxem.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 www.showmyipaddress.com 8 whatismyipaddress.com 13 whatismyip.everdot.org -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\miwnewpjwszorjxgsh.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\zypjdyurhgqiojambtnmd.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\zypjdyurhgqiojambtnmd.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\qqidyurpggrkrnfsibwwoj.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\wqcrgwnfqkpcdtfm.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\kiyrkezvkirinhxiwnge.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\kiyrkezvkirinhxiwnge.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\qqidyurpggrkrnfsibwwoj.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\wqcrgwnfqkpcdtfm.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\kiyrkezvkirinhxiwnge.exe gokvcejrqyu.exe File created C:\Windows\SysWOW64\nenzlymbjacmkxgkrbnenzlymbjacmkxgkr.nen xilrxem.exe File created C:\Windows\SysWOW64\ekijkmptqwnmzbzsonoustuw.dag xilrxem.exe File opened for modification C:\Windows\SysWOW64\nenzlymbjacmkxgkrbnenzlymbjacmkxgkr.nen xilrxem.exe File opened for modification C:\Windows\SysWOW64\zypjdyurhgqiojambtnmd.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\miwnewpjwszorjxgsh.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\xujbtmgbpmukohwgtjb.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\xujbtmgbpmukohwgtjb.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\dylbriatfaguwnait.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\xujbtmgbpmukohwgtjb.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\qqidyurpggrkrnfsibwwoj.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\wqcrgwnfqkpcdtfm.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\dylbriatfaguwnait.exe xilrxem.exe File opened for modification C:\Windows\SysWOW64\ekijkmptqwnmzbzsonoustuw.dag xilrxem.exe File opened for modification C:\Windows\SysWOW64\dylbriatfaguwnait.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\miwnewpjwszorjxgsh.exe gokvcejrqyu.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ekijkmptqwnmzbzsonoustuw.dag xilrxem.exe File created C:\Program Files (x86)\ekijkmptqwnmzbzsonoustuw.dag xilrxem.exe File opened for modification C:\Program Files (x86)\nenzlymbjacmkxgkrbnenzlymbjacmkxgkr.nen xilrxem.exe File created C:\Program Files (x86)\nenzlymbjacmkxgkrbnenzlymbjacmkxgkr.nen xilrxem.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\dylbriatfaguwnait.exe xilrxem.exe File opened for modification C:\Windows\wqcrgwnfqkpcdtfm.exe xilrxem.exe File opened for modification C:\Windows\qqidyurpggrkrnfsibwwoj.exe xilrxem.exe File created C:\Windows\nenzlymbjacmkxgkrbnenzlymbjacmkxgkr.nen xilrxem.exe File opened for modification C:\Windows\miwnewpjwszorjxgsh.exe gokvcejrqyu.exe File opened for modification C:\Windows\xujbtmgbpmukohwgtjb.exe gokvcejrqyu.exe File opened for modification C:\Windows\wqcrgwnfqkpcdtfm.exe xilrxem.exe File opened for modification C:\Windows\xujbtmgbpmukohwgtjb.exe xilrxem.exe File opened for modification C:\Windows\kiyrkezvkirinhxiwnge.exe gokvcejrqyu.exe File opened for modification C:\Windows\zypjdyurhgqiojambtnmd.exe gokvcejrqyu.exe File opened for modification C:\Windows\qqidyurpggrkrnfsibwwoj.exe gokvcejrqyu.exe File opened for modification C:\Windows\zypjdyurhgqiojambtnmd.exe xilrxem.exe File opened for modification C:\Windows\ekijkmptqwnmzbzsonoustuw.dag xilrxem.exe File opened for modification C:\Windows\dylbriatfaguwnait.exe gokvcejrqyu.exe File opened for modification C:\Windows\kiyrkezvkirinhxiwnge.exe xilrxem.exe File opened for modification C:\Windows\zypjdyurhgqiojambtnmd.exe xilrxem.exe File opened for modification C:\Windows\qqidyurpggrkrnfsibwwoj.exe xilrxem.exe File opened for modification C:\Windows\dylbriatfaguwnait.exe xilrxem.exe File opened for modification C:\Windows\miwnewpjwszorjxgsh.exe xilrxem.exe File opened for modification C:\Windows\kiyrkezvkirinhxiwnge.exe xilrxem.exe File created C:\Windows\ekijkmptqwnmzbzsonoustuw.dag xilrxem.exe File opened for modification C:\Windows\wqcrgwnfqkpcdtfm.exe gokvcejrqyu.exe File opened for modification C:\Windows\miwnewpjwszorjxgsh.exe xilrxem.exe File opened for modification C:\Windows\xujbtmgbpmukohwgtjb.exe xilrxem.exe File opened for modification C:\Windows\nenzlymbjacmkxgkrbnenzlymbjacmkxgkr.nen xilrxem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 1188 xilrxem.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 1188 xilrxem.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1188 xilrxem.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 944 wrote to memory of 596 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 27 PID 944 wrote to memory of 596 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 27 PID 944 wrote to memory of 596 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 27 PID 944 wrote to memory of 596 944 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 27 PID 596 wrote to memory of 1188 596 gokvcejrqyu.exe 28 PID 596 wrote to memory of 1188 596 gokvcejrqyu.exe 28 PID 596 wrote to memory of 1188 596 gokvcejrqyu.exe 28 PID 596 wrote to memory of 1188 596 gokvcejrqyu.exe 28 PID 596 wrote to memory of 2036 596 gokvcejrqyu.exe 29 PID 596 wrote to memory of 2036 596 gokvcejrqyu.exe 29 PID 596 wrote to memory of 2036 596 gokvcejrqyu.exe 29 PID 596 wrote to memory of 2036 596 gokvcejrqyu.exe 29 -
System policy modification 1 TTPs 30 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xilrxem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gokvcejrqyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xilrxem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xilrxem.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe"C:\Users\Admin\AppData\Local\Temp\cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\gokvcejrqyu.exe"C:\Users\Admin\AppData\Local\Temp\gokvcejrqyu.exe" "c:\users\admin\appdata\local\temp\cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:596 -
C:\Users\Admin\AppData\Local\Temp\xilrxem.exe"C:\Users\Admin\AppData\Local\Temp\xilrxem.exe" "-C:\Users\Admin\AppData\Local\Temp\wqcrgwnfqkpcdtfm.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\xilrxem.exe"C:\Users\Admin\AppData\Local\Temp\xilrxem.exe" "-C:\Users\Admin\AppData\Local\Temp\wqcrgwnfqkpcdtfm.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
700KB
MD59a4a33d576e101937a0f4d4355e7bfbd
SHA1668486f7a5fd21fbb826b189ff00b9702f60eb2b
SHA2563818affef14787d4535db647dfedf82d1e11a82414aeba7c80027537c37754ad
SHA512f566d61dacc97dd757bd7412064bc4614e40ec8638fd7e23ed9ab3ae9ea27b12e5ca812a24f9af9f92ac2761d8f5639e045994f9e1a7d59818775af2c55207e4
-
Filesize
700KB
MD59a4a33d576e101937a0f4d4355e7bfbd
SHA1668486f7a5fd21fbb826b189ff00b9702f60eb2b
SHA2563818affef14787d4535db647dfedf82d1e11a82414aeba7c80027537c37754ad
SHA512f566d61dacc97dd757bd7412064bc4614e40ec8638fd7e23ed9ab3ae9ea27b12e5ca812a24f9af9f92ac2761d8f5639e045994f9e1a7d59818775af2c55207e4
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
700KB
MD59a4a33d576e101937a0f4d4355e7bfbd
SHA1668486f7a5fd21fbb826b189ff00b9702f60eb2b
SHA2563818affef14787d4535db647dfedf82d1e11a82414aeba7c80027537c37754ad
SHA512f566d61dacc97dd757bd7412064bc4614e40ec8638fd7e23ed9ab3ae9ea27b12e5ca812a24f9af9f92ac2761d8f5639e045994f9e1a7d59818775af2c55207e4
-
Filesize
700KB
MD59a4a33d576e101937a0f4d4355e7bfbd
SHA1668486f7a5fd21fbb826b189ff00b9702f60eb2b
SHA2563818affef14787d4535db647dfedf82d1e11a82414aeba7c80027537c37754ad
SHA512f566d61dacc97dd757bd7412064bc4614e40ec8638fd7e23ed9ab3ae9ea27b12e5ca812a24f9af9f92ac2761d8f5639e045994f9e1a7d59818775af2c55207e4
-
Filesize
700KB
MD59a4a33d576e101937a0f4d4355e7bfbd
SHA1668486f7a5fd21fbb826b189ff00b9702f60eb2b
SHA2563818affef14787d4535db647dfedf82d1e11a82414aeba7c80027537c37754ad
SHA512f566d61dacc97dd757bd7412064bc4614e40ec8638fd7e23ed9ab3ae9ea27b12e5ca812a24f9af9f92ac2761d8f5639e045994f9e1a7d59818775af2c55207e4
-
Filesize
700KB
MD59a4a33d576e101937a0f4d4355e7bfbd
SHA1668486f7a5fd21fbb826b189ff00b9702f60eb2b
SHA2563818affef14787d4535db647dfedf82d1e11a82414aeba7c80027537c37754ad
SHA512f566d61dacc97dd757bd7412064bc4614e40ec8638fd7e23ed9ab3ae9ea27b12e5ca812a24f9af9f92ac2761d8f5639e045994f9e1a7d59818775af2c55207e4