Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe
Resource
win7-20220901-en
General
-
Target
7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe
-
Size
875KB
-
MD5
0d4b9d9590a7931b1a9ec7bad4b81c07
-
SHA1
60c63551ca1ec6088d5f7baccdc7238c9055e59b
-
SHA256
7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae
-
SHA512
e3b0ce50606a0875471c2e2be08566b3199eaf875c43ae7177eb7b903af05ae7e85292674e237b9081601a2b0add7604cdc682b82d780411b9ee5326ea1c5e53
-
SSDEEP
1536:U0bOitM+1vOHlPVElhCGD/qe0k4zMfQCVrUgupsC7:UmTtB4RcjD/TY+r2
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\29F50CFCBCAC569A\0AFE0B.exe = "C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe:*:Enabled:@xpsp2res.dll,-28956246" 0AFE0B.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\29F50CFCBCAC569A\0AFE0B.exe = "C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe:*:Enabled:@xpsp2res.dll,-57951861" 0AFE0B.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 0AFE0B.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\29F50CFCBCAC569A\0AFE0B.exe = "C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe:*:Enabled:@xpsp2res.dll,-70554750" 0AFE0B.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 0AFE0B.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\29F50CFCBCAC569A\0AFE0B.exe = "C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe:*:Enabled:@xpsp2res.dll,-53342401" 0AFE0B.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" 0AFE0B.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" 0AFE0B.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0AFE0B.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 0AFE0B.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 0AFE0B.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0AFE0B.exe -
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 1736 0AFE0B.exe 768 0AFE0B.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sharedaccess.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\anti-trojan.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bipcpevalsetup.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pview95.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssmmc32.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navauto-protect.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zonalm2601.exe 0AFE0B.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OUTLOOK.EXE 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsynmgr.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icloadnt.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\localnet.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\realmon.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vshwin32.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsched.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcc2k_76_1436.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sh.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sweep95.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds-3.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EXCEL.EXE 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ahnsd.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blackice.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Diskmon.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SbieSvc.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atwatch.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sweep.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecls.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sweep95.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HostsChk.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfweng3.02d30.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npssvc.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\platin.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsave32.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavpers40eng.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldscan.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\n32scanw.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostinstall.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfeann.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\acs.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\f-prot.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pathping.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wnt.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\edi.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppvstop.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\supftrl.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taumon.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wimmun32.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpdos32.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsched32.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\connectionmonitor.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsma32.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VACFix.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wyvernworksfirewall.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\periscope.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\supftrl.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sysdoc32.exe 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbwinntw.exe 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vnpc3000.exe\Debugger = "\"C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wyvernworksfirewall.exe 0AFE0B.exe -
resource yara_rule behavioral1/memory/1352-54-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/1352-57-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/1352-58-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/1352-70-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/768-77-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/768-79-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Anytime Upgrade.exe 0AFE0B.exe -
Loads dropped DLL 2 IoCs
pid Process 1352 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 1352 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\cval = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall 0AFE0B.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\B9373D14A02BC13F1345A3F7BC53B8BCC98D3B04DD0CD9CF = "C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe" 0AFE0B.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 0AFE0B.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\E50B29BAACAA360FCC344254003743208BA6735D23877EED = "C:\\Users\\Admin\\29F50CFCBCAC569A\\0AFE0B.exe" 0AFE0B.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0AFE0B.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1324 set thread context of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1736 set thread context of 768 1736 0AFE0B.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Sound 0AFE0B.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Sound\Beep = "no" 0AFE0B.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 0AFE0B.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 0AFE0B.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" 0AFE0B.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://8kv9u764salgz4c.directorio-w.com" 0AFE0B.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://6q6ykl39j84dbmf.directorio-w.com" 0AFE0B.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Download 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://k3zh842nuerlpki.directorio-w.com" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://7c26638694rs23a.directorio-w.com" 0AFE0B.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main 0AFE0B.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Local Page = "http://nq3x50eoc33h98k.directorio-w.com" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page = "http://h162490i6gkxfe6.directorio-w.com" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://ymau5m7973tussh.directorio-w.com" 0AFE0B.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" 0AFE0B.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://ehn41gy642f075i.directorio-w.com" 0AFE0B.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" 0AFE0B.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://tu009c19yv2r15t.directorio-w.com" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://nk7miou8a7cumym.directorio-w.com" 0AFE0B.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec 0AFE0B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http 0AFE0B.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec 0AFE0B.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 768 0AFE0B.exe 768 0AFE0B.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 768 0AFE0B.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1352 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 768 0AFE0B.exe 768 0AFE0B.exe 768 0AFE0B.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1324 wrote to memory of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1324 wrote to memory of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1324 wrote to memory of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1324 wrote to memory of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1324 wrote to memory of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1324 wrote to memory of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1324 wrote to memory of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1324 wrote to memory of 1352 1324 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 27 PID 1352 wrote to memory of 1736 1352 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 28 PID 1352 wrote to memory of 1736 1352 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 28 PID 1352 wrote to memory of 1736 1352 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 28 PID 1352 wrote to memory of 1736 1352 7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe 28 PID 1736 wrote to memory of 768 1736 0AFE0B.exe 29 PID 1736 wrote to memory of 768 1736 0AFE0B.exe 29 PID 1736 wrote to memory of 768 1736 0AFE0B.exe 29 PID 1736 wrote to memory of 768 1736 0AFE0B.exe 29 PID 1736 wrote to memory of 768 1736 0AFE0B.exe 29 PID 1736 wrote to memory of 768 1736 0AFE0B.exe 29 PID 1736 wrote to memory of 768 1736 0AFE0B.exe 29 PID 1736 wrote to memory of 768 1736 0AFE0B.exe 29 PID 1736 wrote to memory of 768 1736 0AFE0B.exe 29 PID 768 wrote to memory of 1208 768 0AFE0B.exe 13 PID 768 wrote to memory of 1208 768 0AFE0B.exe 13 PID 768 wrote to memory of 1208 768 0AFE0B.exe 13 PID 768 wrote to memory of 1208 768 0AFE0B.exe 13 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 0AFE0B.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" 0AFE0B.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe"C:\Users\Admin\AppData\Local\Temp\7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe"C:\Users\Admin\AppData\Local\Temp\7d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\29F50CFCBCAC569A\0AFE0B.exe"C:\Users\Admin\29F50CFCBCAC569A\0AFE0B.exe" 63C331454⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\29F50CFCBCAC569A\0AFE0B.exe63C331455⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:768
-
-
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
875KB
MD50d4b9d9590a7931b1a9ec7bad4b81c07
SHA160c63551ca1ec6088d5f7baccdc7238c9055e59b
SHA2567d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae
SHA512e3b0ce50606a0875471c2e2be08566b3199eaf875c43ae7177eb7b903af05ae7e85292674e237b9081601a2b0add7604cdc682b82d780411b9ee5326ea1c5e53
-
Filesize
875KB
MD50d4b9d9590a7931b1a9ec7bad4b81c07
SHA160c63551ca1ec6088d5f7baccdc7238c9055e59b
SHA2567d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae
SHA512e3b0ce50606a0875471c2e2be08566b3199eaf875c43ae7177eb7b903af05ae7e85292674e237b9081601a2b0add7604cdc682b82d780411b9ee5326ea1c5e53
-
Filesize
875KB
MD50d4b9d9590a7931b1a9ec7bad4b81c07
SHA160c63551ca1ec6088d5f7baccdc7238c9055e59b
SHA2567d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae
SHA512e3b0ce50606a0875471c2e2be08566b3199eaf875c43ae7177eb7b903af05ae7e85292674e237b9081601a2b0add7604cdc682b82d780411b9ee5326ea1c5e53
-
Filesize
875KB
MD50d4b9d9590a7931b1a9ec7bad4b81c07
SHA160c63551ca1ec6088d5f7baccdc7238c9055e59b
SHA2567d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae
SHA512e3b0ce50606a0875471c2e2be08566b3199eaf875c43ae7177eb7b903af05ae7e85292674e237b9081601a2b0add7604cdc682b82d780411b9ee5326ea1c5e53
-
Filesize
875KB
MD50d4b9d9590a7931b1a9ec7bad4b81c07
SHA160c63551ca1ec6088d5f7baccdc7238c9055e59b
SHA2567d2f6b88c50705a2e33af874a986aae3afff9dba81f9401de6081c8cfccc80ae
SHA512e3b0ce50606a0875471c2e2be08566b3199eaf875c43ae7177eb7b903af05ae7e85292674e237b9081601a2b0add7604cdc682b82d780411b9ee5326ea1c5e53