Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 19:32
Static task
static1
Behavioral task
behavioral1
Sample
f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe
Resource
win10v2004-20220812-en
General
-
Target
f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe
-
Size
993KB
-
MD5
032ec4a22b674cb1ea5ba73b6b93c490
-
SHA1
ae6a118b1d2686730d29ffddbb46d6a25f11ce66
-
SHA256
f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30
-
SHA512
d8747d956ecfdcc85792cd6c7434b52a5cb117f47508762bfdcec0b3919c09c1a0f1e937b6bfc4eed9fac3554304715ef38536032cb79d557fd34c8f5b5e45be
-
SSDEEP
24576:Th/LHJTW/SpiiWs4m2hiATWUuVPVOjhlaC6B4U50Xj0EuyVE/ZJ++4MuGIvLKFS3:NLHgbsuNcxQujYvLKFSmA+KO6f
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\NGUcMAYI\\hwgQEgsA.exe," f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\NGUcMAYI\\hwgQEgsA.exe," f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 4 IoCs
pid Process 5092 PaoIMEIw.exe 4004 hwgQEgsA.exe 3420 lEIsYwcY.exe 4660 PaoIMEIw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation hwgQEgsA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hwgQEgsA.exe = "C:\\ProgramData\\NGUcMAYI\\hwgQEgsA.exe" hwgQEgsA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hwgQEgsA.exe = "C:\\ProgramData\\NGUcMAYI\\hwgQEgsA.exe" lEIsYwcY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PaoIMEIw.exe = "C:\\Users\\Admin\\ZyUUsAQU\\PaoIMEIw.exe" PaoIMEIw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PaoIMEIw.exe = "C:\\Users\\Admin\\ZyUUsAQU\\PaoIMEIw.exe" PaoIMEIw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PaoIMEIw.exe = "C:\\Users\\Admin\\ZyUUsAQU\\PaoIMEIw.exe" f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hwgQEgsA.exe = "C:\\ProgramData\\NGUcMAYI\\hwgQEgsA.exe" f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe hwgQEgsA.exe File opened for modification C:\Windows\SysWOW64\sheRestoreProtect.pptx hwgQEgsA.exe File opened for modification C:\Windows\SysWOW64\sheTestResize.bmp hwgQEgsA.exe File opened for modification C:\Windows\SysWOW64\sheWaitBlock.png hwgQEgsA.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\ZyUUsAQU lEIsYwcY.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\ZyUUsAQU\PaoIMEIw lEIsYwcY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 12 IoCs
pid Process 4672 reg.exe 1744 reg.exe 1848 reg.exe 2088 reg.exe 1912 reg.exe 4864 reg.exe 1236 reg.exe 1252 reg.exe 3572 reg.exe 3964 reg.exe 1504 reg.exe 1512 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4004 hwgQEgsA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe 4004 hwgQEgsA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 5092 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 82 PID 3092 wrote to memory of 5092 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 82 PID 3092 wrote to memory of 5092 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 82 PID 3092 wrote to memory of 4004 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 83 PID 3092 wrote to memory of 4004 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 83 PID 3092 wrote to memory of 4004 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 83 PID 3092 wrote to memory of 4896 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 85 PID 3092 wrote to memory of 4896 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 85 PID 3092 wrote to memory of 4896 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 85 PID 4896 wrote to memory of 1988 4896 cmd.exe 93 PID 4896 wrote to memory of 1988 4896 cmd.exe 93 PID 4896 wrote to memory of 1988 4896 cmd.exe 93 PID 3092 wrote to memory of 1744 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 92 PID 3092 wrote to memory of 1744 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 92 PID 3092 wrote to memory of 1744 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 92 PID 3092 wrote to memory of 4672 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 91 PID 3092 wrote to memory of 4672 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 91 PID 3092 wrote to memory of 4672 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 91 PID 3092 wrote to memory of 1236 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 90 PID 3092 wrote to memory of 1236 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 90 PID 3092 wrote to memory of 1236 3092 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 90 PID 4004 wrote to memory of 4660 4004 hwgQEgsA.exe 94 PID 4004 wrote to memory of 4660 4004 hwgQEgsA.exe 94 PID 4004 wrote to memory of 4660 4004 hwgQEgsA.exe 94 PID 1988 wrote to memory of 100 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 95 PID 1988 wrote to memory of 100 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 95 PID 1988 wrote to memory of 100 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 95 PID 1988 wrote to memory of 1252 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 97 PID 1988 wrote to memory of 1252 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 97 PID 1988 wrote to memory of 1252 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 97 PID 1988 wrote to memory of 1848 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 98 PID 1988 wrote to memory of 1848 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 98 PID 1988 wrote to memory of 1848 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 98 PID 1988 wrote to memory of 2088 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 99 PID 1988 wrote to memory of 2088 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 99 PID 1988 wrote to memory of 2088 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 99 PID 1988 wrote to memory of 3824 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 100 PID 1988 wrote to memory of 3824 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 100 PID 1988 wrote to memory of 3824 1988 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 100 PID 100 wrote to memory of 2756 100 cmd.exe 105 PID 100 wrote to memory of 2756 100 cmd.exe 105 PID 100 wrote to memory of 2756 100 cmd.exe 105 PID 3824 wrote to memory of 4784 3824 cmd.exe 106 PID 3824 wrote to memory of 4784 3824 cmd.exe 106 PID 3824 wrote to memory of 4784 3824 cmd.exe 106 PID 2756 wrote to memory of 3368 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 107 PID 2756 wrote to memory of 3368 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 107 PID 2756 wrote to memory of 3368 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 107 PID 2756 wrote to memory of 3572 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 109 PID 2756 wrote to memory of 3572 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 109 PID 2756 wrote to memory of 3572 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 109 PID 2756 wrote to memory of 3964 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 110 PID 2756 wrote to memory of 3964 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 110 PID 2756 wrote to memory of 3964 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 110 PID 2756 wrote to memory of 1912 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 114 PID 2756 wrote to memory of 1912 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 114 PID 2756 wrote to memory of 1912 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 114 PID 2756 wrote to memory of 488 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 113 PID 2756 wrote to memory of 488 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 113 PID 2756 wrote to memory of 488 2756 f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe 113 PID 3368 wrote to memory of 2780 3368 cmd.exe 117 PID 3368 wrote to memory of 2780 3368 cmd.exe 117 PID 3368 wrote to memory of 2780 3368 cmd.exe 117 PID 488 wrote to memory of 4428 488 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe"C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\ZyUUsAQU\PaoIMEIw.exe"C:\Users\Admin\ZyUUsAQU\PaoIMEIw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5092
-
-
C:\ProgramData\NGUcMAYI\hwgQEgsA.exe"C:\ProgramData\NGUcMAYI\hwgQEgsA.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\ZyUUsAQU\PaoIMEIw.exe"C:\Users\Admin\ZyUUsAQU\PaoIMEIw.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30"2⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exeC:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb303⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30"4⤵
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exeC:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb305⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30"6⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exeC:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb307⤵PID:2780
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4864
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
PID:1504
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
PID:1512
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3572
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- Modifies registry key
PID:3964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VSgkIkAU.bat" "C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe""6⤵
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:4428
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
PID:1912
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1252
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:1848
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:2088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BuwQEIgY.bat" "C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:4784
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:1236
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:4672
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yicswkAs.bat" "C:\Users\Admin\AppData\Local\Temp\f6864632b139d20a646bd929fb8ccebc1b1e17a4765d2d4f4ddc3d1a8f6ceb30.exe""2⤵PID:1536
-
-
C:\ProgramData\dsYoMIsQ\lEIsYwcY.exeC:\ProgramData\dsYoMIsQ\lEIsYwcY.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
982KB
MD546a72566d3f9d6eea1c3a879cbf677eb
SHA11aa0d7185dbf51e2c9c5c41e534e03cc093e2510
SHA2565300dd0de92ec16d58da5a1df3a96eb7ec05f288eea03c383db6d68c56614b84
SHA512596a4cf5af0ee752790d05f56444bb8153fafb664a79fe9e63a26359d9cddebc43b9b0e33a070592fc129dc81ced3c238b067591b90f5a05ac5428943fb01d78
-
Filesize
982KB
MD546a72566d3f9d6eea1c3a879cbf677eb
SHA11aa0d7185dbf51e2c9c5c41e534e03cc093e2510
SHA2565300dd0de92ec16d58da5a1df3a96eb7ec05f288eea03c383db6d68c56614b84
SHA512596a4cf5af0ee752790d05f56444bb8153fafb664a79fe9e63a26359d9cddebc43b9b0e33a070592fc129dc81ced3c238b067591b90f5a05ac5428943fb01d78
-
Filesize
982KB
MD5f4ac38a9fb38b752b95d7eb724cfe6bf
SHA177e1f3a7b7e08d6e1a5bd57d7668c72c421a79dd
SHA2564f6f9a55c85a58a467c4fae56f2358c5162aa26e11367cd7d707ee356b4c08b8
SHA5127796a6f6901f001216c45a0f8216986f5fd8dec4b819a5f9858e42fdbe0e39ebda5ca1b38d53fbe3e7ed6c7fb9c8ebd959bcc71ce31f0ce0928f8476271b39e8
-
Filesize
982KB
MD5f4ac38a9fb38b752b95d7eb724cfe6bf
SHA177e1f3a7b7e08d6e1a5bd57d7668c72c421a79dd
SHA2564f6f9a55c85a58a467c4fae56f2358c5162aa26e11367cd7d707ee356b4c08b8
SHA5127796a6f6901f001216c45a0f8216986f5fd8dec4b819a5f9858e42fdbe0e39ebda5ca1b38d53fbe3e7ed6c7fb9c8ebd959bcc71ce31f0ce0928f8476271b39e8
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
6KB
MD5f2139758e1ca788944e3d676ffdf569d
SHA1ac4ba97181837b96227c14b9b7dacee876688f14
SHA256e6886ff1f0d7ba5f6fafe66d8de31dcac805690e3a2c23aa22e4854db03be58d
SHA5124e43e97bd24a6f258872392685f0699faa8f6de78e9685b368f2b277794fb6866b4462eaf906b01bc11e4d1d4e8a064c6948b0aba2146b6800bd3957675bb3b1
-
Filesize
6KB
MD5f2139758e1ca788944e3d676ffdf569d
SHA1ac4ba97181837b96227c14b9b7dacee876688f14
SHA256e6886ff1f0d7ba5f6fafe66d8de31dcac805690e3a2c23aa22e4854db03be58d
SHA5124e43e97bd24a6f258872392685f0699faa8f6de78e9685b368f2b277794fb6866b4462eaf906b01bc11e4d1d4e8a064c6948b0aba2146b6800bd3957675bb3b1
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
981KB
MD5315ff12acaf23496653f548ac15f16b2
SHA1518c8723fd7af882342ba194d1a65ccd7b203acb
SHA256e402bde8571bf4ff41b7f428f51cb4630f4b768cd9506737a467e582867eed6d
SHA512522413962f39528c890e4cccd218724d42e28a7042a83f0df0da88a5750a729e686f0b0346d6d26f2bc7ca738b5ead02227012bb49d8610ea79a358d155db7b8
-
Filesize
981KB
MD5315ff12acaf23496653f548ac15f16b2
SHA1518c8723fd7af882342ba194d1a65ccd7b203acb
SHA256e402bde8571bf4ff41b7f428f51cb4630f4b768cd9506737a467e582867eed6d
SHA512522413962f39528c890e4cccd218724d42e28a7042a83f0df0da88a5750a729e686f0b0346d6d26f2bc7ca738b5ead02227012bb49d8610ea79a358d155db7b8
-
Filesize
981KB
MD5315ff12acaf23496653f548ac15f16b2
SHA1518c8723fd7af882342ba194d1a65ccd7b203acb
SHA256e402bde8571bf4ff41b7f428f51cb4630f4b768cd9506737a467e582867eed6d
SHA512522413962f39528c890e4cccd218724d42e28a7042a83f0df0da88a5750a729e686f0b0346d6d26f2bc7ca738b5ead02227012bb49d8610ea79a358d155db7b8