Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe
Resource
win10v2004-20220901-en
General
-
Target
1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe
-
Size
612KB
-
MD5
0d195b53275f39314a7a56846e3fc090
-
SHA1
93c21a50f6b3ecf0e3e807117e307568af1e7ed0
-
SHA256
1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
-
SHA512
e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
SSDEEP
12288:agkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUCiDjyGWCaz/Fu6r:kxsKXa+hHyWseBglPGWCObr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ksafeq.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ksafeq.exe -
Adds policy Run key to start application 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zgnrp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kgcviicrogtrlkeiwfgc.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mwgnockn = "dwpfpmdpjyiduqhit.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zgnrp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zwtnbcxnlesrmmhmblnkh.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zgnrp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xsnfrqjxtkwtmkdgtbb.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mwgnockn = "wogveaqbuirlbwmm.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zgnrp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wogveaqbuirlbwmm.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zgnrp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wogveaqbuirlbwmm.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mwgnockn = "zwtnbcxnlesrmmhmblnkh.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zgnrp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xsnfrqjxtkwtmkdgtbb.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mwgnockn = "zwtnbcxnlesrmmhmblnkh.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mwgnockn = "kgcviicrogtrlkeiwfgc.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zgnrp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zwtnbcxnlesrmmhmblnkh.exe" ksafeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mwgnockn = "dwpfpmdpjyiduqhit.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mwgnockn = "mgarcasfaqbxpmegsz.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mwgnockn = "xsnfrqjxtkwtmkdgtbb.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zgnrp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kgcviicrogtrlkeiwfgc.exe" ksafeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ksafeq.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ixiyjejjshs.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ksafeq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ksafeq.exe -
Executes dropped EXE 3 IoCs
pid Process 1656 ixiyjejjshs.exe 1076 ksafeq.exe 1712 ksafeq.exe -
Loads dropped DLL 6 IoCs
pid Process 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1656 ixiyjejjshs.exe 1656 ixiyjejjshs.exe 1656 ixiyjejjshs.exe 1656 ixiyjejjshs.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ksafeq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xsnfrqjxtkwtmkdgtbb.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dwpfpmdpjyiduqhit.exe ." ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rerbfwhnbko = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mgarcasfaqbxpmegsz.exe ." ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ksafeq = "dwpfpmdpjyiduqhit.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dozhjyhlx = "zwtnbcxnlesrmmhmblnkh.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rerbfwhnbko = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zwtnbcxnlesrmmhmblnkh.exe ." ixiyjejjshs.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rerbfwhnbko = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zwtnbcxnlesrmmhmblnkh.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kgcviicrogtrlkeiwfgc.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zwtnbcxnlesrmmhmblnkh.exe ." ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ocqbgykrgqvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mgarcasfaqbxpmegsz.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ksafeq = "kgcviicrogtrlkeiwfgc.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dozhjyhlx = "zwtnbcxnlesrmmhmblnkh.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mgarcasfaqbxpmegsz.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dozhjyhlx = "mgarcasfaqbxpmegsz.exe" ksafeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ksafeq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wogveaqbuirlbwmm.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rerbfwhnbko = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kgcviicrogtrlkeiwfgc.exe ." ksafeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ksafeq = "wogveaqbuirlbwmm.exe" ksafeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "zwtnbcxnlesrmmhmblnkh.exe ." ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ocqbgykrgqvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dwpfpmdpjyiduqhit.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dozhjyhlx = "dwpfpmdpjyiduqhit.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wogveaqbuirlbwmm.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wogveaqbuirlbwmm.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wiudgwglyg = "kgcviicrogtrlkeiwfgc.exe ." ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ksafeq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ksafeq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ocqbgykrgqvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wogveaqbuirlbwmm.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "wogveaqbuirlbwmm.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wiudgwglyg = "kgcviicrogtrlkeiwfgc.exe ." ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ocqbgykrgqvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wogveaqbuirlbwmm.exe" ksafeq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "dwpfpmdpjyiduqhit.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ksafeq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mgarcasfaqbxpmegsz.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rerbfwhnbko = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xsnfrqjxtkwtmkdgtbb.exe ." ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rerbfwhnbko = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xsnfrqjxtkwtmkdgtbb.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kgcviicrogtrlkeiwfgc.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mgarcasfaqbxpmegsz.exe ." ixiyjejjshs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wiudgwglyg = "xsnfrqjxtkwtmkdgtbb.exe ." ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ocqbgykrgqvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xsnfrqjxtkwtmkdgtbb.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ksafeq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mgarcasfaqbxpmegsz.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rerbfwhnbko = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kgcviicrogtrlkeiwfgc.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dozhjyhlx = "dwpfpmdpjyiduqhit.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xgpvvip = "dwpfpmdpjyiduqhit.exe ." ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dozhjyhlx = "kgcviicrogtrlkeiwfgc.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dozhjyhlx = "zwtnbcxnlesrmmhmblnkh.exe" ksafeq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ixiyjejjshs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ksafeq = "kgcviicrogtrlkeiwfgc.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ksafeq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zwtnbcxnlesrmmhmblnkh.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ocqbgykrgqvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mgarcasfaqbxpmegsz.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ksafeq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kgcviicrogtrlkeiwfgc.exe" ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ksafeq = "wogveaqbuirlbwmm.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wiudgwglyg = "wogveaqbuirlbwmm.exe ." ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ksafeq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dwpfpmdpjyiduqhit.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wiudgwglyg = "dwpfpmdpjyiduqhit.exe ." ksafeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ksafeq = "kgcviicrogtrlkeiwfgc.exe" ixiyjejjshs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dozhjyhlx = "mgarcasfaqbxpmegsz.exe" ksafeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\wiudgwglyg = "zwtnbcxnlesrmmhmblnkh.exe ." ksafeq.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ksafeq.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixiyjejjshs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ksafeq.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ksafeq.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 whatismyipaddress.com 8 whatismyip.everdot.org 21 www.showmyipaddress.com -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kgcviicrogtrlkeiwfgc.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\wogveaqbuirlbwmm.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\mgarcasfaqbxpmegsz.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\qomhwyulkettpqmsitwusn.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\rerbfwhnbkodoepkpphuhrvmxdraeteuf.ffx ksafeq.exe File opened for modification C:\Windows\SysWOW64\kgcviicrogtrlkeiwfgc.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\dwpfpmdpjyiduqhit.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\qomhwyulkettpqmsitwusn.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\kgcviicrogtrlkeiwfgc.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\acedwccxayrvvaaketaced.ccx ksafeq.exe File created C:\Windows\SysWOW64\rerbfwhnbkodoepkpphuhrvmxdraeteuf.ffx ksafeq.exe File opened for modification C:\Windows\SysWOW64\wogveaqbuirlbwmm.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\wogveaqbuirlbwmm.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\dwpfpmdpjyiduqhit.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\xsnfrqjxtkwtmkdgtbb.exe ksafeq.exe File created C:\Windows\SysWOW64\acedwccxayrvvaaketaced.ccx ksafeq.exe File opened for modification C:\Windows\SysWOW64\zwtnbcxnlesrmmhmblnkh.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\dwpfpmdpjyiduqhit.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\mgarcasfaqbxpmegsz.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\xsnfrqjxtkwtmkdgtbb.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\zwtnbcxnlesrmmhmblnkh.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\qomhwyulkettpqmsitwusn.exe ixiyjejjshs.exe File opened for modification C:\Windows\SysWOW64\mgarcasfaqbxpmegsz.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\xsnfrqjxtkwtmkdgtbb.exe ksafeq.exe File opened for modification C:\Windows\SysWOW64\zwtnbcxnlesrmmhmblnkh.exe ksafeq.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\acedwccxayrvvaaketaced.ccx ksafeq.exe File created C:\Program Files (x86)\acedwccxayrvvaaketaced.ccx ksafeq.exe File opened for modification C:\Program Files (x86)\rerbfwhnbkodoepkpphuhrvmxdraeteuf.ffx ksafeq.exe File created C:\Program Files (x86)\rerbfwhnbkodoepkpphuhrvmxdraeteuf.ffx ksafeq.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\kgcviicrogtrlkeiwfgc.exe ixiyjejjshs.exe File opened for modification C:\Windows\kgcviicrogtrlkeiwfgc.exe ksafeq.exe File opened for modification C:\Windows\zwtnbcxnlesrmmhmblnkh.exe ksafeq.exe File opened for modification C:\Windows\qomhwyulkettpqmsitwusn.exe ksafeq.exe File opened for modification C:\Windows\wogveaqbuirlbwmm.exe ixiyjejjshs.exe File opened for modification C:\Windows\dwpfpmdpjyiduqhit.exe ixiyjejjshs.exe File opened for modification C:\Windows\mgarcasfaqbxpmegsz.exe ixiyjejjshs.exe File opened for modification C:\Windows\wogveaqbuirlbwmm.exe ksafeq.exe File opened for modification C:\Windows\mgarcasfaqbxpmegsz.exe ksafeq.exe File opened for modification C:\Windows\xsnfrqjxtkwtmkdgtbb.exe ksafeq.exe File opened for modification C:\Windows\kgcviicrogtrlkeiwfgc.exe ksafeq.exe File opened for modification C:\Windows\zwtnbcxnlesrmmhmblnkh.exe ixiyjejjshs.exe File opened for modification C:\Windows\qomhwyulkettpqmsitwusn.exe ixiyjejjshs.exe File opened for modification C:\Windows\wogveaqbuirlbwmm.exe ksafeq.exe File opened for modification C:\Windows\zwtnbcxnlesrmmhmblnkh.exe ksafeq.exe File opened for modification C:\Windows\qomhwyulkettpqmsitwusn.exe ksafeq.exe File opened for modification C:\Windows\acedwccxayrvvaaketaced.ccx ksafeq.exe File created C:\Windows\acedwccxayrvvaaketaced.ccx ksafeq.exe File opened for modification C:\Windows\rerbfwhnbkodoepkpphuhrvmxdraeteuf.ffx ksafeq.exe File opened for modification C:\Windows\xsnfrqjxtkwtmkdgtbb.exe ixiyjejjshs.exe File opened for modification C:\Windows\dwpfpmdpjyiduqhit.exe ksafeq.exe File opened for modification C:\Windows\mgarcasfaqbxpmegsz.exe ksafeq.exe File opened for modification C:\Windows\xsnfrqjxtkwtmkdgtbb.exe ksafeq.exe File opened for modification C:\Windows\dwpfpmdpjyiduqhit.exe ksafeq.exe File created C:\Windows\rerbfwhnbkodoepkpphuhrvmxdraeteuf.ffx ksafeq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1076 ksafeq.exe 1076 ksafeq.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1076 ksafeq.exe 1076 ksafeq.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1076 ksafeq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1656 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 28 PID 1116 wrote to memory of 1656 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 28 PID 1116 wrote to memory of 1656 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 28 PID 1116 wrote to memory of 1656 1116 1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe 28 PID 1656 wrote to memory of 1076 1656 ixiyjejjshs.exe 29 PID 1656 wrote to memory of 1076 1656 ixiyjejjshs.exe 29 PID 1656 wrote to memory of 1076 1656 ixiyjejjshs.exe 29 PID 1656 wrote to memory of 1076 1656 ixiyjejjshs.exe 29 PID 1656 wrote to memory of 1712 1656 ixiyjejjshs.exe 30 PID 1656 wrote to memory of 1712 1656 ixiyjejjshs.exe 30 PID 1656 wrote to memory of 1712 1656 ixiyjejjshs.exe 30 PID 1656 wrote to memory of 1712 1656 ixiyjejjshs.exe 30 -
System policy modification 1 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ksafeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ksafeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ksafeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ixiyjejjshs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixiyjejjshs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ksafeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ksafeq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe"C:\Users\Admin\AppData\Local\Temp\1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\ixiyjejjshs.exe"C:\Users\Admin\AppData\Local\Temp\ixiyjejjshs.exe" "c:\users\admin\appdata\local\temp\1978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\ksafeq.exe"C:\Users\Admin\AppData\Local\Temp\ksafeq.exe" "-C:\Users\Admin\AppData\Local\Temp\wogveaqbuirlbwmm.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\ksafeq.exe"C:\Users\Admin\AppData\Local\Temp\ksafeq.exe" "-C:\Users\Admin\AppData\Local\Temp\wogveaqbuirlbwmm.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1712
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
696KB
MD5309c8b88e6fa5355348774728655ddb0
SHA1ff00749c2ea333960d02459886a689c5359550d2
SHA2560d7a32f16c5df3675c10255b507c2d94adece0daae60bc62be50702bec332997
SHA51287d61a1672f53ccff8e9526c2f396f2950edfb656c73724d5ec87fb2dbbf2910e37f82f5e1e5de6fc29d94471c0336cecdb435ae7602d37937511cd740f6d5e4
-
Filesize
696KB
MD5309c8b88e6fa5355348774728655ddb0
SHA1ff00749c2ea333960d02459886a689c5359550d2
SHA2560d7a32f16c5df3675c10255b507c2d94adece0daae60bc62be50702bec332997
SHA51287d61a1672f53ccff8e9526c2f396f2950edfb656c73724d5ec87fb2dbbf2910e37f82f5e1e5de6fc29d94471c0336cecdb435ae7602d37937511cd740f6d5e4
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
612KB
MD50d195b53275f39314a7a56846e3fc090
SHA193c21a50f6b3ecf0e3e807117e307568af1e7ed0
SHA2561978b6cdf7b474f443bfc551fc0bbf9f46073fc4c336b63743d0dbc1fb19e188
SHA512e30b61fcc06adb06f0d60393fb881e7556d4b151c9ec9b45860688370a80fc8cab4e47e9c252daacbfa9fc3233e3819d30189c9334e3f83fce255f70dcd2757d
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
696KB
MD5309c8b88e6fa5355348774728655ddb0
SHA1ff00749c2ea333960d02459886a689c5359550d2
SHA2560d7a32f16c5df3675c10255b507c2d94adece0daae60bc62be50702bec332997
SHA51287d61a1672f53ccff8e9526c2f396f2950edfb656c73724d5ec87fb2dbbf2910e37f82f5e1e5de6fc29d94471c0336cecdb435ae7602d37937511cd740f6d5e4
-
Filesize
696KB
MD5309c8b88e6fa5355348774728655ddb0
SHA1ff00749c2ea333960d02459886a689c5359550d2
SHA2560d7a32f16c5df3675c10255b507c2d94adece0daae60bc62be50702bec332997
SHA51287d61a1672f53ccff8e9526c2f396f2950edfb656c73724d5ec87fb2dbbf2910e37f82f5e1e5de6fc29d94471c0336cecdb435ae7602d37937511cd740f6d5e4
-
Filesize
696KB
MD5309c8b88e6fa5355348774728655ddb0
SHA1ff00749c2ea333960d02459886a689c5359550d2
SHA2560d7a32f16c5df3675c10255b507c2d94adece0daae60bc62be50702bec332997
SHA51287d61a1672f53ccff8e9526c2f396f2950edfb656c73724d5ec87fb2dbbf2910e37f82f5e1e5de6fc29d94471c0336cecdb435ae7602d37937511cd740f6d5e4
-
Filesize
696KB
MD5309c8b88e6fa5355348774728655ddb0
SHA1ff00749c2ea333960d02459886a689c5359550d2
SHA2560d7a32f16c5df3675c10255b507c2d94adece0daae60bc62be50702bec332997
SHA51287d61a1672f53ccff8e9526c2f396f2950edfb656c73724d5ec87fb2dbbf2910e37f82f5e1e5de6fc29d94471c0336cecdb435ae7602d37937511cd740f6d5e4