Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:22
Static task
static1
Behavioral task
behavioral1
Sample
8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe
Resource
win10v2004-20220812-en
General
-
Target
8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe
-
Size
66KB
-
MD5
a20e4ebafe8f48723b9750ad1101cd41
-
SHA1
6c1272e289ba0ad42c7cb9e0cead286c9749f41c
-
SHA256
8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa
-
SHA512
f71e6a6ffc7920b289e3241f4deed50bf0071f653339f5d8e6479049d922141c432df192acbc856bd40546c386caa2980284a68c5bb2f216975a2598d9aa9512
-
SSDEEP
1536:VxcbSkqQHGO5WOiVKggBXdyZuPpIeZqJxxVfBd:kbS0p5WOiVUBXSuPlG1fL
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
urdvxc.exeurdvxc.exeurdvxc.exeurdvxc.exeurdvxc.exepid process 5092 urdvxc.exe 5068 urdvxc.exe 4388 urdvxc.exe 5072 urdvxc.exe 1444 urdvxc.exe -
Drops file in System32 directory 4 IoCs
Processes:
urdvxc.exeurdvxc.exe8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exedescription ioc process File created C:\Windows\SysWOW64\urdvxc.exe urdvxc.exe File created C:\Windows\SysWOW64\urdvxc.exe urdvxc.exe File created C:\Windows\SysWOW64\urdvxc.exe 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe File opened for modification C:\Windows\SysWOW64\urdvxc.exe 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe -
Drops file in Program Files directory 64 IoCs
Processes:
urdvxc.exeurdvxc.exedescription ioc process File opened for modification C:\Program Files\ConfirmAssert.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\Welcome.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh.htm urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bklnbknw.exe urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\equalizer_window.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\README-JDK.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\license.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\about.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\Welcome.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\license.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\README.HTM urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\create_stream.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_browse.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\license.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\nxqsxhql.exe urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\njqrsbcq.exe urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\about.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\qrhljwvn.exe urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\RELEASE-NOTES.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html urdvxc.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\jtlnctqk.exe urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\mosaic_window.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\license.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlbvwvhv.exe urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\browse_window.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\offset_window.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html urdvxc.exe File opened for modification C:\Program Files\ConfirmAssert.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\1033\MCABOUT.HTM urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\sekbhrbe.exe urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\tsbknceh.exe urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\bkbbtzlb.exe urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\epl-v10.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_config_window.html urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html urdvxc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\1033\rvhrjtnt.exe urdvxc.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\about.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\index.html urdvxc.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\hrbhlxhb.exe urdvxc.exe -
Modifies registry class 64 IoCs
Processes:
urdvxc.exeurdvxc.exe8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exeurdvxc.exeurdvxc.exeurdvxc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5CA91ECD-564C-3E29-5336-C066EB2FABF6}\LocalServer32\ = "C:\\Program Files\\Java\\jre1.8.0_66\\jtlnctqk.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A1F8B4D-AC79-4B22-67EA-E30560A5BF1C}\ = "lschwlshtbszswrz" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58F22A6B-E9C1-CE13-9AB2-6E6A8B42D5FD}\LocalServer32\ = "C:\\Program Files\\Java\\jdk1.8.0_66\\lib\\missioncontrol\\features\\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\\njqrsbcq.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564}\LocalServer32\ = "C:\\Program Files\\Microsoft Office\\root\\Office16\\PersonaSpy\\tsbknceh.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CD8AFD91-3B6A-B684-7AA6-A172692ABA70} 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "bnbclnhxswkvbrej" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "nscnhssxwsbetrts" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "jsknrlvhnetssqvt" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58F22A6B-E9C1-CE13-9AB2-6E6A8B42D5FD}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17B30228-FEAE-52CE-E831-3379C40FDBE8}\ = "kbcsrrvhwvcsvswl" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62B77361-C052-178D-5313-7AF2D2475E12}\ = "vtnrszsqjkbnqwrh" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8308FF82-554C-D53A-FE36-8DDED83673EF}\LocalServer32\ = "C:\\Program Files\\VideoLAN\\VLC\\lua\\http\\hrbhlxhb.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58F22A6B-E9C1-CE13-9AB2-6E6A8B42D5FD}\ = "rbwneqrkkektenct" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C803653-A26A-88C7-574B-3B28BF06C94C}\ = "knzknselrvlsrsws" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8308FF82-554C-D53A-FE36-8DDED83673EF} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\ = "wsrjbntqvljhntxz" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4DA7BCA8-2512-8FCE-67B5-F36442F4E210}\LocalServer32\ = "C:\\Program Files\\VideoLAN\\VLC\\lua\\http\\vlbvwvhv.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62B77361-C052-178D-5313-7AF2D2475E12}\LocalServer32\ = "C:\\Program Files\\VideoLAN\\VLC\\lua\\http\\nxqsxhql.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892}\ = "kblnkrnlntnvxlhe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892}\LocalServer32\ = "C:\\Program Files\\Microsoft Office\\root\\vfs\\ProgramFilesCommonX64\\Microsoft Shared\\Smart Tag\\1033\\rvhrjtnt.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CD8AFD91-3B6A-B684-7AA6-A172692ABA70}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe" 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "thbkjweqlhcnhbrj" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E88A8DA-6487-F103-FFE5-C2B0648486DC} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17B30228-FEAE-52CE-E831-3379C40FDBE8} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\ = "hrbxbklsxvlrqbsh" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564}\ = "srhbjnhhlwrrslen" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17B30228-FEAE-52CE-E831-3379C40FDBE8}\LocalServer32\ = "C:\\Program Files\\Java\\jdk1.8.0_66\\lib\\missioncontrol\\features\\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\\nsstljje.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D9E5B2A0-6DA4-8211-3F09-7196AABBE564} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BFAF607-9DDA-565E-A528-64082B45FA4C}\ = "sskkxlekezqwnlqj" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A1F8B4D-AC79-4B22-67EA-E30560A5BF1C}\LocalServer32\ = "C:\\Program Files\\VideoLAN\\VLC\\lua\\http\\bkbbtzlb.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4DA7BCA8-2512-8FCE-67B5-F36442F4E210}\ = "jbckehrtbjqlnrnb" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8308FF82-554C-D53A-FE36-8DDED83673EF}\ = "tcverebjlcxtshwb" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62B77361-C052-178D-5313-7AF2D2475E12} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8308FF82-554C-D53A-FE36-8DDED83673EF}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E88A8DA-6487-F103-FFE5-C2B0648486DC}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58F22A6B-E9C1-CE13-9AB2-6E6A8B42D5FD}\ = "bnlxznlbcbsevnsr" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\LocalServer32 urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17B30228-FEAE-52CE-E831-3379C40FDBE8}\ = "lbwscestvlctvkne" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{17B30228-FEAE-52CE-E831-3379C40FDBE8}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58F22A6B-E9C1-CE13-9AB2-6E6A8B42D5FD} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C803653-A26A-88C7-574B-3B28BF06C94C} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB4470BE-3A35-A218-C7F6-4398C8694892} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7774BDCB-BC2A-526E-C798-34FA771E21D1}\LocalServer32\ = "C:\\Program Files\\Java\\jdk1.8.0_66\\db\\qrhljwvn.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BFAF607-9DDA-565E-A528-64082B45FA4C}\LocalServer32\ = "C:\\Program Files\\VideoLAN\\VLC\\lua\\http\\kznjrtew.exe" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4DA7BCA8-2512-8FCE-67B5-F36442F4E210} urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66E9A00C-64D1-4956-05AE-619DF5D22A84}\LocalServer32\ = "C:\\Windows\\SysWOW64\\urdvxc.exe" urdvxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3E88A8DA-6487-F103-FFE5-C2B0648486DC}\ = "lhknhjrtrcbhksbh" urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5CA91ECD-564C-3E29-5336-C066EB2FABF6} urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5CA91ECD-564C-3E29-5336-C066EB2FABF6}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A1F8B4D-AC79-4B22-67EA-E30560A5BF1C}\LocalServer32 urdvxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CD8AFD91-3B6A-B684-7AA6-A172692ABA70}\LocalServer32 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C803653-A26A-88C7-574B-3B28BF06C94C}\LocalServer32 urdvxc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
urdvxc.exedescription pid process Token: SeDebugPrivilege 5092 urdvxc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exedescription pid process target process PID 5104 wrote to memory of 5092 5104 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe urdvxc.exe PID 5104 wrote to memory of 5092 5104 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe urdvxc.exe PID 5104 wrote to memory of 5092 5104 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe urdvxc.exe PID 5104 wrote to memory of 5068 5104 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe urdvxc.exe PID 5104 wrote to memory of 5068 5104 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe urdvxc.exe PID 5104 wrote to memory of 5068 5104 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe urdvxc.exe PID 5104 wrote to memory of 5072 5104 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe urdvxc.exe PID 5104 wrote to memory of 5072 5104 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe urdvxc.exe PID 5104 wrote to memory of 5072 5104 8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe urdvxc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe"C:\Users\Admin\AppData\Local\Temp\8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /installservice2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /start2⤵
- Executes dropped EXE
- Modifies registry class
PID:5068 -
C:\Windows\SysWOW64\urdvxc.exeC:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\8b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa.exe2⤵
- Executes dropped EXE
- Modifies registry class
PID:5072
-
C:\Windows\SysWOW64\urdvxc.exe"C:\Windows\SysWOW64\urdvxc.exe" /service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
PID:4388
-
C:\Windows\SysWOW64\urdvxc.exe"C:\Windows\SysWOW64\urdvxc.exe" /service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
PID:1444
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.8.0_66\db\README-JDK.htmlFilesize
1012B
MD5661986eb37cc9cfc2f17614e81d71a6d
SHA16f5a8828691bfabda2656ba5435c39db61933cba
SHA2565edb9dd67373164b6d5297e4fad9846c712451a74f8a8a965c39c61c19646a03
SHA51211da83092eebe57cc2493d37f480bf706880883a1c4c7af910fe1e2d1fa3c923b7f6cca99d8bfc61255879ef146af94b0925cc07ca53c431b4ef1f24d36e970e
-
C:\Program Files\Java\jdk1.8.0_66\jre\Welcome.htmlFilesize
1KB
MD5126dc28a60fa70ca98434f1b6196855b
SHA1eaeb0f2ae09670985868a7410b08df899486339a
SHA2563475436612f6a0ef77fc91331d008090bfd53c7cc8535225762ab43234c730c7
SHA5127d07229039cbb7eb39d5cdf3846fb41f4f2f5a829cf7c0d5c778bf50c7eaa17ab7dd4c7fe483c38d3ebb72669d117a6db122ee58f63d712f795c38ad680ae52a
-
C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.htmlFilesize
1KB
MD5d9551396767d37a60f3c76f8b82333b1
SHA18a42a662427276aecc87d704b9df1f156a78a7ae
SHA256226ac83c0f1f836563f3c81a5367e3ea7686cfd6754034b482e9c33e765df294
SHA51251cdbf454fd7af0247ee8df696a370dfb894fe7ea8c4a8b4fbf280505eff333fff185b5d4b8e197a5a3142a0ff111a57b26197ebe6c40cd7c8d3effc407352e4
-
C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\license.htmlFilesize
6KB
MD595948307f4a36f9750e8175547ad5066
SHA1d688009e149a66fa1ba0773ba9db0d68b7430222
SHA2569edcb05e432c8d6e301dfdfa343cd00225e9a79d89906d4a3d9d5b6405391297
SHA51259c0c051fc0c383809ea8bdf837ab38a0a46bc55ef55e1e358abd43b0594974973f4adbac21302b827467042b40a67a6babbeff351ee9a8b1149ae83f898d151
-
C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\about.htmlFilesize
1KB
MD5f31930a2d55a728fcc361f35073c4f8a
SHA184699d348359582098b22e7461f3f3e310fcf8b1
SHA2568702f4240fe9f9a5c6867dc56722cc1de9ad1f980e6bab753975ce9f15bec1df
SHA5126060d2bf5c318d39f1f33ce4406e41947ade20b725830c97601bffb75e53b561b533acb4b13acbfc0fbde466009050540c9540d7b0ae3862a1a46f98573777a7
-
C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.htmlFilesize
6KB
MD53244dd03155c75814463bc3780d83e41
SHA174be0ffa2b26b24ca3810447daaa70e1724430df
SHA2563ce49b7863704f6d3823aaeec4a4f404f7f95e478f80e9b9c306c2bed95fc013
SHA512cec9e7ef61efeaa2b9eb14cc3222b5f9f714c72231d9366e12e7187716e83174995b87d8b9f8934de95c07c1f9dacb33b05fd83a0c142a8843525bfcb77ab664
-
C:\Windows\SysWOW64\urdvxc.exeFilesize
66KB
MD5a20e4ebafe8f48723b9750ad1101cd41
SHA16c1272e289ba0ad42c7cb9e0cead286c9749f41c
SHA2568b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa
SHA512f71e6a6ffc7920b289e3241f4deed50bf0071f653339f5d8e6479049d922141c432df192acbc856bd40546c386caa2980284a68c5bb2f216975a2598d9aa9512
-
C:\Windows\SysWOW64\urdvxc.exeFilesize
66KB
MD5a20e4ebafe8f48723b9750ad1101cd41
SHA16c1272e289ba0ad42c7cb9e0cead286c9749f41c
SHA2568b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa
SHA512f71e6a6ffc7920b289e3241f4deed50bf0071f653339f5d8e6479049d922141c432df192acbc856bd40546c386caa2980284a68c5bb2f216975a2598d9aa9512
-
C:\Windows\SysWOW64\urdvxc.exeFilesize
66KB
MD5a20e4ebafe8f48723b9750ad1101cd41
SHA16c1272e289ba0ad42c7cb9e0cead286c9749f41c
SHA2568b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa
SHA512f71e6a6ffc7920b289e3241f4deed50bf0071f653339f5d8e6479049d922141c432df192acbc856bd40546c386caa2980284a68c5bb2f216975a2598d9aa9512
-
C:\Windows\SysWOW64\urdvxc.exeFilesize
66KB
MD5a20e4ebafe8f48723b9750ad1101cd41
SHA16c1272e289ba0ad42c7cb9e0cead286c9749f41c
SHA2568b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa
SHA512f71e6a6ffc7920b289e3241f4deed50bf0071f653339f5d8e6479049d922141c432df192acbc856bd40546c386caa2980284a68c5bb2f216975a2598d9aa9512
-
C:\Windows\SysWOW64\urdvxc.exeFilesize
66KB
MD5a20e4ebafe8f48723b9750ad1101cd41
SHA16c1272e289ba0ad42c7cb9e0cead286c9749f41c
SHA2568b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa
SHA512f71e6a6ffc7920b289e3241f4deed50bf0071f653339f5d8e6479049d922141c432df192acbc856bd40546c386caa2980284a68c5bb2f216975a2598d9aa9512
-
C:\Windows\SysWOW64\urdvxc.exeFilesize
66KB
MD5a20e4ebafe8f48723b9750ad1101cd41
SHA16c1272e289ba0ad42c7cb9e0cead286c9749f41c
SHA2568b2c2ed2caadf6dc589204661f74e67956d755ef8ac932008c8efa92db858cfa
SHA512f71e6a6ffc7920b289e3241f4deed50bf0071f653339f5d8e6479049d922141c432df192acbc856bd40546c386caa2980284a68c5bb2f216975a2598d9aa9512
-
memory/1444-151-0x00000000001C0000-0x00000000001DF000-memory.dmpFilesize
124KB
-
memory/1444-150-0x00000000001C0000-0x00000000001DF000-memory.dmpFilesize
124KB
-
memory/4388-143-0x00000000001E0000-0x00000000001FF000-memory.dmpFilesize
124KB
-
memory/4388-147-0x00000000001E0000-0x00000000001FF000-memory.dmpFilesize
124KB
-
memory/4388-148-0x00000000001E0000-0x00000000001FF000-memory.dmpFilesize
124KB
-
memory/5068-142-0x00000000001C0000-0x00000000001DF000-memory.dmpFilesize
124KB
-
memory/5068-139-0x0000000000000000-mapping.dmp
-
memory/5072-144-0x0000000000000000-mapping.dmp
-
memory/5072-146-0x00000000001C0000-0x00000000001DF000-memory.dmpFilesize
124KB
-
memory/5092-138-0x00000000001E0000-0x00000000001FF000-memory.dmpFilesize
124KB
-
memory/5092-137-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/5092-134-0x0000000000000000-mapping.dmp
-
memory/5104-132-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/5104-133-0x00000000001E0000-0x00000000001FF000-memory.dmpFilesize
124KB