Analysis
-
max time kernel
188s -
max time network
241s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 06:53
Static task
static1
Behavioral task
behavioral1
Sample
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe
Resource
win10v2004-20221111-en
General
-
Target
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe
-
Size
1.2MB
-
MD5
6ed29f629da1a85b7b854aafda1e369a
-
SHA1
25cdd05e00d1900aabca3e8a7d11f1a9e4547e3a
-
SHA256
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441
-
SHA512
75833a06204dc1d763105ccd427d667cfab5f060e310ab329d243e71f00ae0aa65ecc322ff35291a6ddfcea912a84506d6a99c62d4c38dc4a1958d0b31bd176b
-
SSDEEP
24576:0tb20pkaCqT5TBWgNQ7ar3YKEBCd1s31LgABGkoyXtkcnO16A:dVg5tQ7ar3GB+1eLFtvnG5
Malware Config
Extracted
njrat
0.7d
A0AYFJ0PJtXGl9PaJat
193.0.200.131:35689
0dcfc9e55379c2e16a422bb33c97d277
-
reg_key
0dcfc9e55379c2e16a422bb33c97d277
-
splitter
|'|'|
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
Processes:
wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeucsvc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Local\\temp\\WINDOWS\\TEMPARCHIVE\\taskeng.exe" ucsvc.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
taskeng.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taskeng.exe -
Blocks application from running via registry modification 64 IoCs
Adds application to list of disallowed applications.
Processes:
wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\BK3 = "sb32mon.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Yh5 = "TopSearch.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Jr8 = "vschosts.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\j7k = "AutoUpdateRun.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\JQp = "MailSkinner.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\BzM = "Njexplor.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\H7k = "alevir.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6S8 = "chkdskw.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7ss = "regbar.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\PVN = "Facebook_Updater.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\fIt = "explorer32.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\cZw = "f5r4bnh.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\m7Z = "wndupdate.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\som = "Spy Cleaner Platinum.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\MF0 = "gtbcheck.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\XQv = "2183.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\BBU = "install_flash_player.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\zZE = "NortonUpdate.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\p2q = "ntvdm.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\VxN = "Sd2006.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\MPu = "soft_pcp_conduit.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\LiB = "softload.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\lZw = "180sa.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\arn = "cnalvin.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\EXD = "CPMC.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Bz1 = "w32istbar-la.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\AMu = "cmesys.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\PcL = "msmsnserver.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\GGb = "NAVtask.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\RNb = "csrrs.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\sMW = "smsiexec.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\wUA = "soundtask.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Wh0 = "wmimgmt.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\SSw = "#1SpywareKiller.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Z4x = "APS.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\UqT = "spywareremovalwizard.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\pnY = "ZComService.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6ee = "acrobat.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Fi6 = "fontfix.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9ut = "iesmn.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\ZaU = "mscornet.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Hjw = "tbps.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\JlD = "CmdShell.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\e2C = "msasvc.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\FtU = "tdxdowkc.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\79Q = "ACCDEFRAGINFO.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\Afs = "debug_32.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\b4C = "directx.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\JNo = "cartao.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\DxP = "fvprotect.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\WxM = "wmiaqsrv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\MpT = "adwin.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\qlc = "PopularScreenSavers.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\j4Q = "btstack.ibs" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1GJ = "iwnvod.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\YkH = "gah95on6.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\hoT = "Facebook.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\SOc = "webrebates.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\jTu = "acebarupdate.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5UF = "qpanel.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\HMl = "dlcres0407.dll" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\tfR = "ActiveNetworkMonitor.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\tC5 = "RegistrySweeper.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\BXt = "csrsrv.exe" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe -
Drops file in Drivers directory 13 IoCs
Processes:
attrib.exeattrib.exeattrib.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeattrib.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\services attrib.exe File opened for modification C:\Windows\System32\drivers\etc\lmhosts.sam attrib.exe File opened for modification C:\Windows\System32\drivers\etc\networks attrib.exe File opened for modification C:\Windows\System32\drivers\etc\services attrib.exe File opened for modification C:\Windows\System32\drivers\etc attrib.exe File opened for modification C:\Windows\system32\drivers\etc\hosts wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\networks attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\protocol attrib.exe File opened for modification C:\Windows\System32\drivers\etc\lmhosts.sam attrib.exe File opened for modification C:\Windows\System32\drivers\etc\protocol attrib.exe File opened for modification C:\Windows\System32\drivers\etc attrib.exe -
Executes dropped EXE 5 IoCs
Processes:
wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exetaskeng.exeucsvc.exewksprt.exewksprt.exepid process 1108 wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe 468 taskeng.exe 564 ucsvc.exe 1628 wksprt.exe 336 wksprt.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets file to hidden 1 TTPs 16 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 2032 attrib.exe 872 attrib.exe 1536 attrib.exe 1572 attrib.exe 1680 attrib.exe 1820 attrib.exe 1608 attrib.exe 1764 attrib.exe 1156 attrib.exe 1496 attrib.exe 1352 attrib.exe 1504 attrib.exe 1568 attrib.exe 1804 attrib.exe 1744 attrib.exe 744 attrib.exe -
Loads dropped DLL 3 IoCs
Processes:
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exewksprt.exepid process 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 1628 wksprt.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
ucsvc.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*Boot Service Utility = "C:\\Users\\Admin\\AppData\\Local\\temp\\WINDOWS\\TEMPARCHIVE\\ucsvc.exe" ucsvc.exe Key deleted \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key deleted \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wksprt.exedescription pid process target process PID 1628 set thread context of 336 1628 wksprt.exe wksprt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
ucsvc.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" ucsvc.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Download\DisallowRun = "1" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskeng.exeucsvc.exepid process 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe 564 ucsvc.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe 564 ucsvc.exe 564 ucsvc.exe 564 ucsvc.exe 564 ucsvc.exe 564 ucsvc.exe 564 ucsvc.exe 564 ucsvc.exe 564 ucsvc.exe 564 ucsvc.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe 468 taskeng.exe 564 ucsvc.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe 564 ucsvc.exe 468 taskeng.exe 468 taskeng.exe 564 ucsvc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskeng.exeucsvc.exewksprt.exedescription pid process Token: SeDebugPrivilege 468 taskeng.exe Token: SeDebugPrivilege 564 ucsvc.exe Token: SeDebugPrivilege 1628 wksprt.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exepid process 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exepid process 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.execmd.exeWScript.exetaskeng.execmd.exewtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.execmd.exedescription pid process target process PID 520 wrote to memory of 1108 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe PID 520 wrote to memory of 1108 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe PID 520 wrote to memory of 1108 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe PID 520 wrote to memory of 1108 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe PID 520 wrote to memory of 468 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe taskeng.exe PID 520 wrote to memory of 468 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe taskeng.exe PID 520 wrote to memory of 468 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe taskeng.exe PID 520 wrote to memory of 468 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe taskeng.exe PID 520 wrote to memory of 612 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe cmd.exe PID 520 wrote to memory of 612 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe cmd.exe PID 520 wrote to memory of 612 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe cmd.exe PID 520 wrote to memory of 612 520 e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe cmd.exe PID 612 wrote to memory of 628 612 cmd.exe WScript.exe PID 612 wrote to memory of 628 612 cmd.exe WScript.exe PID 612 wrote to memory of 628 612 cmd.exe WScript.exe PID 612 wrote to memory of 628 612 cmd.exe WScript.exe PID 628 wrote to memory of 1352 628 WScript.exe regini.exe PID 628 wrote to memory of 1352 628 WScript.exe regini.exe PID 628 wrote to memory of 1352 628 WScript.exe regini.exe PID 628 wrote to memory of 1352 628 WScript.exe regini.exe PID 468 wrote to memory of 564 468 taskeng.exe ucsvc.exe PID 468 wrote to memory of 564 468 taskeng.exe ucsvc.exe PID 468 wrote to memory of 564 468 taskeng.exe ucsvc.exe PID 468 wrote to memory of 1196 468 taskeng.exe cmd.exe PID 468 wrote to memory of 1196 468 taskeng.exe cmd.exe PID 468 wrote to memory of 1196 468 taskeng.exe cmd.exe PID 1196 wrote to memory of 2032 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 2032 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 2032 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1608 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1608 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1608 1196 cmd.exe attrib.exe PID 1108 wrote to memory of 2000 1108 wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe cmd.exe PID 1108 wrote to memory of 2000 1108 wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe cmd.exe PID 1108 wrote to memory of 2000 1108 wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe cmd.exe PID 1196 wrote to memory of 1764 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1764 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1764 1196 cmd.exe attrib.exe PID 2000 wrote to memory of 1512 2000 cmd.exe cacls.exe PID 2000 wrote to memory of 1512 2000 cmd.exe cacls.exe PID 2000 wrote to memory of 1512 2000 cmd.exe cacls.exe PID 1196 wrote to memory of 1504 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1504 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1504 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1496 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1496 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1496 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1568 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1568 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1568 1196 cmd.exe attrib.exe PID 2000 wrote to memory of 1640 2000 cmd.exe cacls.exe PID 2000 wrote to memory of 1640 2000 cmd.exe cacls.exe PID 2000 wrote to memory of 1640 2000 cmd.exe cacls.exe PID 1196 wrote to memory of 1156 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1156 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 1156 1196 cmd.exe attrib.exe PID 2000 wrote to memory of 760 2000 cmd.exe cacls.exe PID 2000 wrote to memory of 760 2000 cmd.exe cacls.exe PID 2000 wrote to memory of 760 2000 cmd.exe cacls.exe PID 1196 wrote to memory of 872 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 872 1196 cmd.exe attrib.exe PID 1196 wrote to memory of 872 1196 cmd.exe attrib.exe PID 2000 wrote to memory of 1536 2000 cmd.exe attrib.exe PID 2000 wrote to memory of 1536 2000 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 16 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 2032 attrib.exe 1156 attrib.exe 1608 attrib.exe 1536 attrib.exe 1352 attrib.exe 744 attrib.exe 1764 attrib.exe 1504 attrib.exe 1496 attrib.exe 872 attrib.exe 1744 attrib.exe 1820 attrib.exe 1568 attrib.exe 1804 attrib.exe 1572 attrib.exe 1680 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe"C:\Users\Admin\AppData\Local\Temp\e606ebb8d01184c9bb6f684b03acae1f54b8f4faafcbf6c8f0be404b32a61441.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeC:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exe2⤵
- Modifies WinLogon for persistence
- Blocks application from running via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IyQoe.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cacls.execacls C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE /E /P everyone:n4⤵
-
C:\Windows\system32\cacls.execacls C:\Users\Admin\AppData\Local\Temp\WINDOWS /E /P everyone:n4⤵
-
C:\Windows\system32\cacls.execacls C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime /E /P everyone:n4⤵
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Windows\System32\drivers\etc\*.*"4⤵
- Drops file in Drivers directory
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Windows\System32\drivers\etc"4⤵
- Drops file in Drivers directory
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exeC:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\temp\WINDOWS\TEMPARCHIVE\ucsvc.exe"C:\Users\Admin\AppData\Local\temp\WINDOWS\TEMPARCHIVE\ucsvc.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe"C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exeC:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\temp\WorkspaceRuntime\wksprt.exe" "wksprt.exe" ENABLE6⤵
- Modifies Windows Firewall
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\v.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Windows\System32\drivers\etc\*.*"4⤵
- Drops file in Drivers directory
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Windows\System32\drivers\etc"4⤵
- Drops file in Drivers directory
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WINDOWS\*.*"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +a +h +s +r "C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime"4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c %temp%\WINDOWS\TEMPARCHIVE\kFUh8z3gTk3.vbs2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\kFUh8z3gTk3.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regini.exe"C:\Windows\System32\regini.exe" rad024BA.tmp4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IyQoe.batFilesize
522B
MD5254160d9b9287bff589b6246f99d8eec
SHA1876310cdd302898f5c8f4041037f18bacf07bcbe
SHA25616e99344bda2b1338204f4e89c3c6b6a8efbb168a76ed624cba9f4d1ad3fd9a4
SHA512002d0415387e60b9ef11a6e95787f03ec34c571676d7e5cafd54b6352855ca24e9099d1faa970a5cabdaa1f26620676cbb56e028cfdc54045119e0535a70444a
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\kFUh8z3gTk3.vbsFilesize
348B
MD5a0926bc919989b99c9e0a6b4ce4aa30e
SHA192d4f4352f8779b9b3d027ecaa3bbfc1a3490714
SHA256fe2cb98959883d7523f401652fe2e60b691fb4d79cd14d7e02602df0eda8edc0
SHA5122fc1533fa9a77e80f266e88ecafd9de501705f3b8ae50d4994517c0aececb8d7609fb644772e4d9b9e5fa2b6f23ccf3a9181c03217a59b90d94f002b4cf8415f
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exeFilesize
59KB
MD53aa31ccc52e5f05188e5ac84f55fb06f
SHA1b334aeff292fec54909810e44cfdf6d9fa6c4fb6
SHA256155e963480151497924d5220e5a373e37a4298d9399e551e0694a5f2be930282
SHA5124f294a1c76ad0b720791ee93c0e91ce3acc7128a30c521e106adbffe5ee9ce679533d887a2437478c2f51bafde9e2e15658165440fa4fa590d6b14ed14c3ab11
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exeFilesize
59KB
MD53aa31ccc52e5f05188e5ac84f55fb06f
SHA1b334aeff292fec54909810e44cfdf6d9fa6c4fb6
SHA256155e963480151497924d5220e5a373e37a4298d9399e551e0694a5f2be930282
SHA5124f294a1c76ad0b720791ee93c0e91ce3acc7128a30c521e106adbffe5ee9ce679533d887a2437478c2f51bafde9e2e15658165440fa4fa590d6b14ed14c3ab11
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\ucsvc.exeFilesize
70KB
MD56b4f12869c822faff28fe9377531655b
SHA1784fb31f33a92695e4dc6eefeaccc13086ae277f
SHA25606688797d34750928fc847a12db9d2c747d97ea514b1f7d077d6620b160ac958
SHA5125a65c6e30903790ed4c557ffa3ccae0c1a177b0a3b7cacade93faf84c8e7f20f410b5a710ebfd58e0e23e57addf9dc96391254db660f74618f7057204baafae3
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeFilesize
126KB
MD5aedddd810b0fbb4b5346be5a71d6b8dc
SHA191e567a984004e467c8067eb334b010531354681
SHA2560fa8e108788bc2b65e9b524de5b198261f5cd1503d53f390cdb5c75a83e524ff
SHA512a67786b66aab1b2ccbd19269349e5b5ca82858936b1f5ba970f851ddb750e1f87041eae5b7a014fbba516984061022726a897e28ab1b489381bc0223d4b9495a
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeFilesize
126KB
MD5aedddd810b0fbb4b5346be5a71d6b8dc
SHA191e567a984004e467c8067eb334b010531354681
SHA2560fa8e108788bc2b65e9b524de5b198261f5cd1503d53f390cdb5c75a83e524ff
SHA512a67786b66aab1b2ccbd19269349e5b5ca82858936b1f5ba970f851ddb750e1f87041eae5b7a014fbba516984061022726a897e28ab1b489381bc0223d4b9495a
-
C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exeFilesize
173KB
MD5c3e0b61d64ccdb38323478d58beee899
SHA160a31e51017f6e1a860b0144562662672765fcee
SHA256c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c
SHA51279530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc
-
C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exeFilesize
173KB
MD5c3e0b61d64ccdb38323478d58beee899
SHA160a31e51017f6e1a860b0144562662672765fcee
SHA256c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c
SHA51279530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc
-
C:\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exeFilesize
173KB
MD5c3e0b61d64ccdb38323478d58beee899
SHA160a31e51017f6e1a860b0144562662672765fcee
SHA256c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c
SHA51279530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc
-
C:\Users\Admin\AppData\Local\Temp\rad024BA.tmpFilesize
68B
MD5036fe9e90e1573c91f9f99bcf8170df0
SHA171009f2ea2955bd48c602d9c76c35b93ba141565
SHA256562c327100cf8ebbe415fa3aff9ff7c7ec8ce8c3bb680cfc0315e7d677469648
SHA512ddb09e217f812527568a959695976b3c1812b0015a3600cf1bec87bd6e9a20bea50c44b72e76702e75af340bfdaa88eee386c7081952372ffab16ac2bc03a820
-
C:\Users\Admin\AppData\Local\Temp\v.batFilesize
384B
MD52ec56e11d99afad1e6fba39be82df172
SHA18ace61da9bf03dfa3f05e4a2eee2311ade93040f
SHA256fe08f1f73ef0636a84ff7b757a04f2f99c417b4c0d63d9da8952c4154830b929
SHA5125fb85766c7ae10f5839fcdb02518caabb9cc44012ea8cc108c0c4ee78f0a04549cf4a2e0d33ce03a00748baa79f25f63e288513d869d967658fa222fbd11cc21
-
C:\Users\Admin\AppData\Local\temp\WINDOWS\TEMPARCHIVE\ucsvc.exeFilesize
70KB
MD56b4f12869c822faff28fe9377531655b
SHA1784fb31f33a92695e4dc6eefeaccc13086ae277f
SHA25606688797d34750928fc847a12db9d2c747d97ea514b1f7d077d6620b160ac958
SHA5125a65c6e30903790ed4c557ffa3ccae0c1a177b0a3b7cacade93faf84c8e7f20f410b5a710ebfd58e0e23e57addf9dc96391254db660f74618f7057204baafae3
-
C:\Windows\System32\drivers\etc\hostsFilesize
1KB
MD501ae587c73cd331fd2da4caeca584612
SHA1ee2f06eba879af91442b137c36861c131f9fbc26
SHA256464da2c16792622be63fb6e5795853c24d84473080d7090948147dc1c1c27e68
SHA512650e69fa28985a4fd79a530f4fd5f08ae0590160e9db25872f0d3ea50a612674c076090e9d1f8ec7335a2473fa51088577436a2ec8e702e9402f16d467fbb1e5
-
\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\taskeng.exeFilesize
59KB
MD53aa31ccc52e5f05188e5ac84f55fb06f
SHA1b334aeff292fec54909810e44cfdf6d9fa6c4fb6
SHA256155e963480151497924d5220e5a373e37a4298d9399e551e0694a5f2be930282
SHA5124f294a1c76ad0b720791ee93c0e91ce3acc7128a30c521e106adbffe5ee9ce679533d887a2437478c2f51bafde9e2e15658165440fa4fa590d6b14ed14c3ab11
-
\Users\Admin\AppData\Local\Temp\WINDOWS\TEMPARCHIVE\wtUs15F2v7wsLSM6A1JpKC7TJMmva6R8ZjW2svISYXjH4g0CcWY3Vs94mTlnF5R3ZFYsy5MYR.exeFilesize
126KB
MD5aedddd810b0fbb4b5346be5a71d6b8dc
SHA191e567a984004e467c8067eb334b010531354681
SHA2560fa8e108788bc2b65e9b524de5b198261f5cd1503d53f390cdb5c75a83e524ff
SHA512a67786b66aab1b2ccbd19269349e5b5ca82858936b1f5ba970f851ddb750e1f87041eae5b7a014fbba516984061022726a897e28ab1b489381bc0223d4b9495a
-
\Users\Admin\AppData\Local\Temp\WorkspaceRuntime\wksprt.exeFilesize
173KB
MD5c3e0b61d64ccdb38323478d58beee899
SHA160a31e51017f6e1a860b0144562662672765fcee
SHA256c345e50343e02438fe02fada1fea45caa2901b774f5d1bd3ab228f605b874c7c
SHA51279530f1b91e6400cd02fe9e51d1b6620550a4df24604e323e755126fc527ee2e67e5278e87a4fd8e79096bb6eab398d882cef5d5524fe420db5b068ccd978dbc
-
memory/336-119-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/336-116-0x000000000040749E-mapping.dmp
-
memory/336-122-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/336-125-0x0000000073F30000-0x00000000744DB000-memory.dmpFilesize
5.7MB
-
memory/336-115-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/336-124-0x0000000073F30000-0x00000000744DB000-memory.dmpFilesize
5.7MB
-
memory/468-112-0x0000000001EC6000-0x0000000001EE5000-memory.dmpFilesize
124KB
-
memory/468-74-0x0000000001EC6000-0x0000000001EE5000-memory.dmpFilesize
124KB
-
memory/468-73-0x000007FEF2910000-0x000007FEF39A6000-memory.dmpFilesize
16.6MB
-
memory/468-64-0x000007FEF39B0000-0x000007FEF43D3000-memory.dmpFilesize
10.1MB
-
memory/468-60-0x0000000000000000-mapping.dmp
-
memory/520-54-0x0000000075351000-0x0000000075353000-memory.dmpFilesize
8KB
-
memory/564-80-0x000007FEF2910000-0x000007FEF39A6000-memory.dmpFilesize
16.6MB
-
memory/564-78-0x000007FEF39B0000-0x000007FEF43D3000-memory.dmpFilesize
10.1MB
-
memory/564-82-0x0000000000AB6000-0x0000000000AD5000-memory.dmpFilesize
124KB
-
memory/564-113-0x0000000000AB6000-0x0000000000AD5000-memory.dmpFilesize
124KB
-
memory/564-76-0x0000000000000000-mapping.dmp
-
memory/612-65-0x0000000000000000-mapping.dmp
-
memory/628-68-0x0000000000000000-mapping.dmp
-
memory/744-105-0x0000000000000000-mapping.dmp
-
memory/760-97-0x0000000000000000-mapping.dmp
-
memory/872-99-0x0000000000000000-mapping.dmp
-
memory/1108-89-0x0000000002086000-0x00000000020A5000-memory.dmpFilesize
124KB
-
memory/1108-81-0x0000000002086000-0x00000000020A5000-memory.dmpFilesize
124KB
-
memory/1108-72-0x000007FEF2910000-0x000007FEF39A6000-memory.dmpFilesize
16.6MB
-
memory/1108-63-0x000007FEF39B0000-0x000007FEF43D3000-memory.dmpFilesize
10.1MB
-
memory/1108-56-0x0000000000000000-mapping.dmp
-
memory/1156-96-0x0000000000000000-mapping.dmp
-
memory/1196-79-0x0000000000000000-mapping.dmp
-
memory/1352-104-0x0000000000000000-mapping.dmp
-
memory/1352-70-0x0000000000000000-mapping.dmp
-
memory/1496-93-0x0000000000000000-mapping.dmp
-
memory/1504-92-0x0000000000000000-mapping.dmp
-
memory/1512-91-0x0000000000000000-mapping.dmp
-
memory/1536-100-0x0000000000000000-mapping.dmp
-
memory/1568-94-0x0000000000000000-mapping.dmp
-
memory/1572-102-0x0000000000000000-mapping.dmp
-
memory/1608-86-0x0000000000000000-mapping.dmp
-
memory/1628-108-0x0000000000000000-mapping.dmp
-
memory/1628-111-0x00000000744E0000-0x0000000074A8B000-memory.dmpFilesize
5.7MB
-
memory/1628-121-0x00000000744E0000-0x0000000074A8B000-memory.dmpFilesize
5.7MB
-
memory/1640-95-0x0000000000000000-mapping.dmp
-
memory/1652-126-0x0000000000000000-mapping.dmp
-
memory/1680-106-0x0000000000000000-mapping.dmp
-
memory/1744-103-0x0000000000000000-mapping.dmp
-
memory/1764-88-0x0000000000000000-mapping.dmp
-
memory/1804-101-0x0000000000000000-mapping.dmp
-
memory/1820-107-0x0000000000000000-mapping.dmp
-
memory/2000-87-0x0000000000000000-mapping.dmp
-
memory/2032-84-0x0000000000000000-mapping.dmp