Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe
Resource
win10v2004-20220812-en
General
-
Target
f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe
-
Size
556KB
-
MD5
04baf571ca0fa1f19fca9fb7275b4800
-
SHA1
052e16d714c18121c63b184ffd9c38cf7e8db98b
-
SHA256
f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
-
SHA512
cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
SSDEEP
12288:zgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUsTx5KEZh:vxsKXa+hHyWseBgnh
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ktxymo.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ktxymo.exe -
Adds policy Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfounuhrajo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxqgjaxrkdszjreciwnle.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfounuhrajo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhxkkysjzpbfmrbwzk.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofrawgwjvhppst = "khzoqgcvnftzipbydqgd.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofrawgwjvhppst = "mhxkkysjzpbfmrbwzk.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfounuhrajo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxmyxkdtixilrveya.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfounuhrajo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khzoqgcvnftzipbydqgd.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofrawgwjvhppst = "zxqgjaxrkdszjreciwnle.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfounuhrajo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtkyzojbsjwbjpawamb.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofrawgwjvhppst = "zxqgjaxrkdszjreciwnle.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofrawgwjvhppst = "wpdomyqfthrtybjc.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfounuhrajo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtkyzojbsjwbjpawamb.exe" ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iffdguquspp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfounuhrajo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wpdomyqfthrtybjc.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofrawgwjvhppst = "xtkyzojbsjwbjpawamb.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfounuhrajo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxqgjaxrkdszjreciwnle.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofrawgwjvhppst = "xtkyzojbsjwbjpawamb.exe" ktxymo.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iffdguquspp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ktxymo.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ktxymo.exe -
Executes dropped EXE 3 IoCs
pid Process 268 iffdguquspp.exe 1988 ktxymo.exe 1212 ktxymo.exe -
Loads dropped DLL 6 IoCs
pid Process 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 268 iffdguquspp.exe 268 iffdguquspp.exe 268 iffdguquspp.exe 268 iffdguquspp.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce iffdguquspp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxmyxkdtixilrveya.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "wpdomyqfthrtybjc.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mhxkkysjzpbfmrbwzk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxqgjaxrkdszjreciwnle.exe" ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wpdomyqfthrtybjc.exe ." ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "wpdomyqfthrtybjc.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxmyxkdtixilrveya.exe" ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rjwgdoftgtcdhjq = "mhxkkysjzpbfmrbwzk.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "khzoqgcvnftzipbydqgd.exe" ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "mhxkkysjzpbfmrbwzk.exe ." ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxmyxkdtixilrveya = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhxkkysjzpbfmrbwzk.exe ." ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mhxkkysjzpbfmrbwzk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhxkkysjzpbfmrbwzk.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxmyxkdtixilrveya = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khzoqgcvnftzipbydqgd.exe ." iffdguquspp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wpdomyqfthrtybjc = "dxmyxkdtixilrveya.exe ." ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxmyxkdtixilrveya = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khzoqgcvnftzipbydqgd.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rjwgdoftgtcdhjq = "xtkyzojbsjwbjpawamb.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "zxqgjaxrkdszjreciwnle.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxmyxkdtixilrveya = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxmyxkdtixilrveya.exe ." ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iffdguquspp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wpdomyqfthrtybjc = "dxmyxkdtixilrveya.exe ." iffdguquspp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wpdomyqfthrtybjc.exe ." iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "zxqgjaxrkdszjreciwnle.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "mhxkkysjzpbfmrbwzk.exe" ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wpdomyqfthrtybjc = "xtkyzojbsjwbjpawamb.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wpdomyqfthrtybjc = "mhxkkysjzpbfmrbwzk.exe ." ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mhxkkysjzpbfmrbwzk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtkyzojbsjwbjpawamb.exe" iffdguquspp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ktxymo.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ktxymo.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtkyzojbsjwbjpawamb.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mhxkkysjzpbfmrbwzk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtkyzojbsjwbjpawamb.exe" ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce iffdguquspp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "dxmyxkdtixilrveya.exe ." iffdguquspp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iffdguquspp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "wpdomyqfthrtybjc.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wpdomyqfthrtybjc = "wpdomyqfthrtybjc.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rjwgdoftgtcdhjq = "wpdomyqfthrtybjc.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxmyxkdtixilrveya = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khzoqgcvnftzipbydqgd.exe ." ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "zxqgjaxrkdszjreciwnle.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxqgjaxrkdszjreciwnle.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rjwgdoftgtcdhjq = "zxqgjaxrkdszjreciwnle.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxmyxkdtixilrveya = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtkyzojbsjwbjpawamb.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhxkkysjzpbfmrbwzk.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "dxmyxkdtixilrveya.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wpdomyqfthrtybjc = "xtkyzojbsjwbjpawamb.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wpdomyqfthrtybjc = "khzoqgcvnftzipbydqgd.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khzoqgcvnftzipbydqgd.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rjwgdoftgtcdhjq = "khzoqgcvnftzipbydqgd.exe" ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wpdomyqfthrtybjc = "zxqgjaxrkdszjreciwnle.exe ." ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "xtkyzojbsjwbjpawamb.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mhxkkysjzpbfmrbwzk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khzoqgcvnftzipbydqgd.exe" ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rjwgdoftgtcdhjq = "mhxkkysjzpbfmrbwzk.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mhxkkysjzpbfmrbwzk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxqgjaxrkdszjreciwnle.exe" ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxqgjaxrkdszjreciwnle.exe ." ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mhxkkysjzpbfmrbwzk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khzoqgcvnftzipbydqgd.exe" ktxymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxmyxkdtixilrveya = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtkyzojbsjwbjpawamb.exe ." ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khzoqgcvnftzipbydqgd.exe" ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rjwgdoftgtcdhjq = "dxmyxkdtixilrveya.exe" ktxymo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\odnuowkvfpvt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khzoqgcvnftzipbydqgd.exe" iffdguquspp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ndowrapbmxedf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtkyzojbsjwbjpawamb.exe ." ktxymo.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iffdguquspp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ktxymo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ktxymo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ktxymo.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 whatismyipaddress.com 3 www.showmyipaddress.com 7 whatismyip.everdot.org -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mhxkkysjzpbfmrbwzk.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\qpjaewupjdtbmvjipewvpg.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\jpqozydfghetlbwcqmlrsqbaf.ijg ktxymo.exe File opened for modification C:\Windows\SysWOW64\ofrawgwjvhppstzqpwgxjsoyobnzhhklriho.pbk ktxymo.exe File opened for modification C:\Windows\SysWOW64\mhxkkysjzpbfmrbwzk.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\wpdomyqfthrtybjc.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\mhxkkysjzpbfmrbwzk.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\dxmyxkdtixilrveya.exe ktxymo.exe File created C:\Windows\SysWOW64\ofrawgwjvhppstzqpwgxjsoyobnzhhklriho.pbk ktxymo.exe File opened for modification C:\Windows\SysWOW64\zxqgjaxrkdszjreciwnle.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\zxqgjaxrkdszjreciwnle.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\wpdomyqfthrtybjc.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\xtkyzojbsjwbjpawamb.exe ktxymo.exe File created C:\Windows\SysWOW64\jpqozydfghetlbwcqmlrsqbaf.ijg ktxymo.exe File opened for modification C:\Windows\SysWOW64\wpdomyqfthrtybjc.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\dxmyxkdtixilrveya.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\zxqgjaxrkdszjreciwnle.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\xtkyzojbsjwbjpawamb.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\khzoqgcvnftzipbydqgd.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\qpjaewupjdtbmvjipewvpg.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\khzoqgcvnftzipbydqgd.exe ktxymo.exe File opened for modification C:\Windows\SysWOW64\xtkyzojbsjwbjpawamb.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\khzoqgcvnftzipbydqgd.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\qpjaewupjdtbmvjipewvpg.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\dxmyxkdtixilrveya.exe ktxymo.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\ofrawgwjvhppstzqpwgxjsoyobnzhhklriho.pbk ktxymo.exe File opened for modification C:\Program Files (x86)\jpqozydfghetlbwcqmlrsqbaf.ijg ktxymo.exe File created C:\Program Files (x86)\jpqozydfghetlbwcqmlrsqbaf.ijg ktxymo.exe File opened for modification C:\Program Files (x86)\ofrawgwjvhppstzqpwgxjsoyobnzhhklriho.pbk ktxymo.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\wpdomyqfthrtybjc.exe ktxymo.exe File opened for modification C:\Windows\dxmyxkdtixilrveya.exe ktxymo.exe File opened for modification C:\Windows\zxqgjaxrkdszjreciwnle.exe ktxymo.exe File opened for modification C:\Windows\dxmyxkdtixilrveya.exe ktxymo.exe File opened for modification C:\Windows\wpdomyqfthrtybjc.exe iffdguquspp.exe File opened for modification C:\Windows\dxmyxkdtixilrveya.exe iffdguquspp.exe File opened for modification C:\Windows\khzoqgcvnftzipbydqgd.exe iffdguquspp.exe File opened for modification C:\Windows\qpjaewupjdtbmvjipewvpg.exe iffdguquspp.exe File opened for modification C:\Windows\mhxkkysjzpbfmrbwzk.exe ktxymo.exe File opened for modification C:\Windows\xtkyzojbsjwbjpawamb.exe ktxymo.exe File opened for modification C:\Windows\qpjaewupjdtbmvjipewvpg.exe ktxymo.exe File opened for modification C:\Windows\mhxkkysjzpbfmrbwzk.exe ktxymo.exe File opened for modification C:\Windows\mhxkkysjzpbfmrbwzk.exe iffdguquspp.exe File opened for modification C:\Windows\xtkyzojbsjwbjpawamb.exe iffdguquspp.exe File opened for modification C:\Windows\zxqgjaxrkdszjreciwnle.exe iffdguquspp.exe File opened for modification C:\Windows\zxqgjaxrkdszjreciwnle.exe ktxymo.exe File opened for modification C:\Windows\qpjaewupjdtbmvjipewvpg.exe ktxymo.exe File created C:\Windows\ofrawgwjvhppstzqpwgxjsoyobnzhhklriho.pbk ktxymo.exe File opened for modification C:\Windows\khzoqgcvnftzipbydqgd.exe ktxymo.exe File opened for modification C:\Windows\xtkyzojbsjwbjpawamb.exe ktxymo.exe File opened for modification C:\Windows\jpqozydfghetlbwcqmlrsqbaf.ijg ktxymo.exe File opened for modification C:\Windows\ofrawgwjvhppstzqpwgxjsoyobnzhhklriho.pbk ktxymo.exe File opened for modification C:\Windows\wpdomyqfthrtybjc.exe ktxymo.exe File opened for modification C:\Windows\khzoqgcvnftzipbydqgd.exe ktxymo.exe File created C:\Windows\jpqozydfghetlbwcqmlrsqbaf.ijg ktxymo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1988 ktxymo.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1988 ktxymo.exe 1988 ktxymo.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1988 ktxymo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1816 wrote to memory of 268 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 27 PID 1816 wrote to memory of 268 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 27 PID 1816 wrote to memory of 268 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 27 PID 1816 wrote to memory of 268 1816 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 27 PID 268 wrote to memory of 1988 268 iffdguquspp.exe 28 PID 268 wrote to memory of 1988 268 iffdguquspp.exe 28 PID 268 wrote to memory of 1988 268 iffdguquspp.exe 28 PID 268 wrote to memory of 1988 268 iffdguquspp.exe 28 PID 268 wrote to memory of 1212 268 iffdguquspp.exe 29 PID 268 wrote to memory of 1212 268 iffdguquspp.exe 29 PID 268 wrote to memory of 1212 268 iffdguquspp.exe 29 PID 268 wrote to memory of 1212 268 iffdguquspp.exe 29 -
System policy modification 1 TTPs 30 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iffdguquspp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ktxymo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ktxymo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ktxymo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe"C:\Users\Admin\AppData\Local\Temp\f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\iffdguquspp.exe"C:\Users\Admin\AppData\Local\Temp\iffdguquspp.exe" "c:\users\admin\appdata\local\temp\f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:268 -
C:\Users\Admin\AppData\Local\Temp\ktxymo.exe"C:\Users\Admin\AppData\Local\Temp\ktxymo.exe" "-C:\Users\Admin\AppData\Local\Temp\wpdomyqfthrtybjc.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\ktxymo.exe"C:\Users\Admin\AppData\Local\Temp\ktxymo.exe" "-C:\Users\Admin\AppData\Local\Temp\wpdomyqfthrtybjc.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1212
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
712KB
MD52975a767f850f7796847a9c576330bee
SHA102fb6c0015f35d57cc8f1364c5ba29659a9f8c0d
SHA2561aa4a45c4c00092ed995816ad85b659ebe556d722d471b210bc8294d7d721be7
SHA512115b9a7d161f1fe273c2f040943fd6f7614e0755d9e0940f1716cbc25f4bcc18f007902ec9094a55cc105a7b7ac01533ef6bbe6878a14753e17c3d1624e91d96
-
Filesize
712KB
MD52975a767f850f7796847a9c576330bee
SHA102fb6c0015f35d57cc8f1364c5ba29659a9f8c0d
SHA2561aa4a45c4c00092ed995816ad85b659ebe556d722d471b210bc8294d7d721be7
SHA512115b9a7d161f1fe273c2f040943fd6f7614e0755d9e0940f1716cbc25f4bcc18f007902ec9094a55cc105a7b7ac01533ef6bbe6878a14753e17c3d1624e91d96
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
712KB
MD52975a767f850f7796847a9c576330bee
SHA102fb6c0015f35d57cc8f1364c5ba29659a9f8c0d
SHA2561aa4a45c4c00092ed995816ad85b659ebe556d722d471b210bc8294d7d721be7
SHA512115b9a7d161f1fe273c2f040943fd6f7614e0755d9e0940f1716cbc25f4bcc18f007902ec9094a55cc105a7b7ac01533ef6bbe6878a14753e17c3d1624e91d96
-
Filesize
712KB
MD52975a767f850f7796847a9c576330bee
SHA102fb6c0015f35d57cc8f1364c5ba29659a9f8c0d
SHA2561aa4a45c4c00092ed995816ad85b659ebe556d722d471b210bc8294d7d721be7
SHA512115b9a7d161f1fe273c2f040943fd6f7614e0755d9e0940f1716cbc25f4bcc18f007902ec9094a55cc105a7b7ac01533ef6bbe6878a14753e17c3d1624e91d96
-
Filesize
712KB
MD52975a767f850f7796847a9c576330bee
SHA102fb6c0015f35d57cc8f1364c5ba29659a9f8c0d
SHA2561aa4a45c4c00092ed995816ad85b659ebe556d722d471b210bc8294d7d721be7
SHA512115b9a7d161f1fe273c2f040943fd6f7614e0755d9e0940f1716cbc25f4bcc18f007902ec9094a55cc105a7b7ac01533ef6bbe6878a14753e17c3d1624e91d96
-
Filesize
712KB
MD52975a767f850f7796847a9c576330bee
SHA102fb6c0015f35d57cc8f1364c5ba29659a9f8c0d
SHA2561aa4a45c4c00092ed995816ad85b659ebe556d722d471b210bc8294d7d721be7
SHA512115b9a7d161f1fe273c2f040943fd6f7614e0755d9e0940f1716cbc25f4bcc18f007902ec9094a55cc105a7b7ac01533ef6bbe6878a14753e17c3d1624e91d96