Analysis
-
max time kernel
43s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 08:24
Static task
static1
Behavioral task
behavioral1
Sample
b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe
-
Size
1.3MB
-
MD5
16f59c62272b1343d309e3e1b0da7825
-
SHA1
bf82748483677a98195cb23e4f69dd098085ccbb
-
SHA256
b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f
-
SHA512
400fa1e99e5a35666cbfd34eb65c0eaff1a22f64d23ab4a6437f75f77082335c6b02e5c6776e3e51d652cd8b7eb602d707045bd6c1b42b5ae17746e4c793df70
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batdescription pid process target process PID 1924 created 584 1924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat svchost.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exew7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows Mail\\Backup\\LNlctan87FToZwODJOblOloAlMdrOXEvofg7TgRL7GF7cM7ixtLmlBSKNdmW.exe\" O" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Network Shortcuts\\HEO5n4iv575q8r3edvippA83IT9DOByfodbFKNUGpdaX8EujCeBfZNPXA5hHbaRA4XEfv.exe\" O" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IECompatCache\\CkLhRHCGfbOtxoB5ZBpT1iNrS7BIYTN1qG6JFCG0eUsh5cZCC8Ug6YayS.exe\" O" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Local Storage\\leveldb\\v162wkJrOW9gSgp2ICHaklGG0WmcVks4q9hWYQI3.exe\" O" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat -
Executes dropped EXE 2 IoCs
Processes:
w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batw7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batpid process 1924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat 924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batw7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat -
Drops startup file 1 IoCs
Processes:
b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AOSpJsvjAvtt70axtDizoWOOJy9GFtVIlwCXKGKm30q1vslnEcQhs18AHhFVgb8jVxKDx.exe b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe -
Loads dropped DLL 3 IoCs
Processes:
gpscript.exew7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batpid process 1868 gpscript.exe 1868 gpscript.exe 1924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 60 IoCs
Processes:
gpscript.exew7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batb9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\8hAqhAG6jGcpE4j8UWG.exe\" O 2>NUL" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\.DEFAULT b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\35\\qkwf0r1DRFfcbbIPdMIiUstVXKY6hTjafZST3l3JanMSv.exe\" O" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-738 = "Start Internet Explorer without ActiveX controls or browser extensions." w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\S-1-5-20\SOFTWARE b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows Defender\\Definition Updates\\Updates\\rCNUUdp8t2Ib5.exe\" O 2>NUL" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000708cb499d900d901 gpscript.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Sync Data\\jcLqKycdo3.exe\" O 2>NUL" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\jdk1.7.0_80_x64\\Pj7PZo4DMbRhrvxU0GPH4Eex06Tg.exe\" O" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows Defender\\Scans\\History\\CacheManager\\WMxwBoparSmWKjCrIkW23PHj3HKXScKr.exe\" O 2>NUL" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\WidevineCdm\\0BRgmnaraCpGDMeDfcQVdMQfRhZPviaoNu.exe\" O" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Mozilla\\Firefox\\Profiles\\4gq1sglk.default-release\\cache2\\entries\\nFlOHclhNAftqaTpx8THjKg.exe\" O 2>NUL" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Code Cache\\wasm\\index-dir\\bEmgqNISfnacUReJ1KEO8kjo7vc5oOlvtbvF7A1j0bQwjUxNVGDvp7PbLvXeab22huE3VC.exe\" O" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\GrShaderCache\\GPUCache\\mEiRlcEKFvakUAzC380JYU3WUvtEfdZNbT2omWz9Yo95V.exe\" O" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-19 b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Ringtones\\GuLvgacGNLKCpQ4QHCFLnwUQ7WN7RKCYym6uUIrhPz0QEUxn2UQJRGgp.exe\" O 2>NUL" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\37\\bjdPuENvWUeDv68jBasWq.exe\" O" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\FileTypePolicies\\68DUj6Z4hNKHeK7BYOSbfqzskcrZMKRvKPXouhoLk1.exe\" O" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-20 b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\KiwZ635tWtwQfwpSQtkPi0GqypPXNGQj3LxIiAv0phBTUG.exe\" O" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 010000000000000090e605a1d900d901 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%systemroot%\system32\windowspowershell\v1.0\powershell.exe",-111 = "Performs object-based (command-line) functions" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\28\\OwbKuz5T5QwF5tKVbkLLmWqTTzdhPzZSPnt.exe\" O 2>NUL" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Mozilla\\Firefox\\Profiles\\4gq1sglk.default-release\\thumbnails\\foP8CRntXa35Qd6AwVrtxA5wrsiCkVFOVcM2oQ0QjaMLlRae7iGmIcjFN.exe\" O 2>NUL" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\AppData\\Roaming\\Microsoft\\Internet Explorer\\p6Kr5wLafChYy3jkalBho0LUme59u3oW7sgUPoIwyp5tjMO.exe\" O" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\Pictures\\m5lR35zrY1NKoZ4hWcv26XBA7vF.exe\" O 2>NUL" w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat -
Modifies registry class 12 IoCs
Processes:
b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\SOFTWARE\Microsoft\Command Processor b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Command Processor b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\8\\7J3gDDCKeyIa9YNMpyVn2PugWRF4sEfR.exe\" O 2>NUL" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\AOSpJsvjAvtt70axtDizoWOOJy9GFtVIlwCXKGKm30q1vslnEcQhs18AHhFVgb8jVxKDx.exe\" O" b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batpid process 924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat 924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exeAUDIODG.EXEw7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batw7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batdescription pid process Token: SeBackupPrivilege 1744 b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Token: SeRestorePrivilege 1744 b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Token: SeShutdownPrivilege 1744 b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe Token: 33 276 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 276 AUDIODG.EXE Token: 33 276 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 276 AUDIODG.EXE Token: SeDebugPrivilege 1924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Token: SeRestorePrivilege 1924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Token: SeDebugPrivilege 924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat Token: SeRestorePrivilege 924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
gpscript.exew7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batdescription pid process target process PID 1868 wrote to memory of 1924 1868 gpscript.exe w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat PID 1868 wrote to memory of 1924 1868 gpscript.exe w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat PID 1868 wrote to memory of 1924 1868 gpscript.exe w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat PID 1924 wrote to memory of 924 1924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat PID 1924 wrote to memory of 924 1924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat PID 1924 wrote to memory of 924 1924 w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:584
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat"C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-
C:\Users\Admin\AppData\Local\Temp\b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe"C:\Users\Admin\AppData\Local\Temp\b9b62d4efd53a9866a2cd84c16172af87508ae35607cfe18e9fe85b0dc16c91f.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1860
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4841⤵
- Suspicious use of AdjustPrivilegeToken
PID:276
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1672
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat"C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.bat" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex\gYx2F7ofU.exeFilesize
1.4MB
MD5d279d432848a6bbab204071552100f94
SHA145498861ba2092d54c3974a55bcbcddd2c571b8f
SHA2567a00e9d4be348a443b754f15cf5d8c92f51066bf315f28e3d73aad45c3655f41
SHA512e0b82ea628dbd241900bc47d18e4b0d5e0aa410ab9908d23d2c7e5f581f9ebb077a0f9e12385c7c3817597a0d2aff750982f2b218cd8186da0a8470860777625
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\NmkjbnWkQtdWrdIuRPdxuQWQ8Z2SRSMYJOwjP9Ws3I.exeFilesize
2.9MB
MD52dc93c8a1c33e3e79200f9bddef56d74
SHA137ebf8a27a65ef9f80f5b6de1daeb2658f5af5e3
SHA256088a3a1e525221512d294301803563c4f15ebe6069b03f5436bb872a786f3f2d
SHA5127951f6bd7753af42cf98bda0891692ed798b2de32fc48a004844eb4926cd74a977b041c739519c52d45cf02b4992250b250d50aedde5eb9bf6b491067b756350
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\qkwf0r1DRFfcbbIPdMIiUstVXKY6hTjafZST3l3JanMSv.exeFilesize
1.6MB
MD566f3068e9406a737160ff15852217278
SHA197ca7dc38a5c558d847ef2a57f800f3ed5560317
SHA2568519abb30974ec8be0444f027ff1e3fe99c8ed7f692ec06c56c0964151f5ed43
SHA51240af21817ee52a2ec66c8e4d495f319f14d06a4b99c2438d9959c43193c193d73e2f32ee68d3c2cc3a54028d8975ebe5579b28f532dcfdb6afe347ecc9087329
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batFilesize
1.9MB
MD5b921c800e2fa6fa51a35a8876bb55512
SHA1315ac53e6abb5ca63684a0ea5e92c446bb457ab4
SHA256940cc5d54e3c1abc5bb25712086656d7d2445a46eee1d05397a1e430fe18a2b3
SHA5123637c548129b7004e96b63427c6cc3900097df4ebec9d51ccfd75ae40924509080196a1bdeb2fdd28c097ca46504c2b677e7cf352d806d8abc5893392f93552f
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batFilesize
1.9MB
MD5b921c800e2fa6fa51a35a8876bb55512
SHA1315ac53e6abb5ca63684a0ea5e92c446bb457ab4
SHA256940cc5d54e3c1abc5bb25712086656d7d2445a46eee1d05397a1e430fe18a2b3
SHA5123637c548129b7004e96b63427c6cc3900097df4ebec9d51ccfd75ae40924509080196a1bdeb2fdd28c097ca46504c2b677e7cf352d806d8abc5893392f93552f
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batFilesize
1.9MB
MD5b921c800e2fa6fa51a35a8876bb55512
SHA1315ac53e6abb5ca63684a0ea5e92c446bb457ab4
SHA256940cc5d54e3c1abc5bb25712086656d7d2445a46eee1d05397a1e430fe18a2b3
SHA5123637c548129b7004e96b63427c6cc3900097df4ebec9d51ccfd75ae40924509080196a1bdeb2fdd28c097ca46504c2b677e7cf352d806d8abc5893392f93552f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\jcLqKycdo3.exeFilesize
2.1MB
MD59723ebb5d3086f1b1f1d660c1894dca5
SHA1d19eb2d0e4539cd256f7b16cfd5a20366cb66243
SHA256fb6dc81ecfebe69673b7e2e68371db9fb4af115ef6d5aa0196b1fab53fa8f878
SHA51285c86ea432c02e6ddc5f9feaedc2b505d12891bcfe89fe5ac2ff44146c1f2c8b482e72a5cff704ceb933ddef886c20f98c781162dd471827af4489b847a85c81
-
C:\Users\Admin\AppData\Local\KiwZ635tWtwQfwpSQtkPi0GqypPXNGQj3LxIiAv0phBTUG.exeFilesize
1.9MB
MD503ac9f4ff9d2dbb14d588d227779f14d
SHA1936e6fb3ec41a4b360a2d1d37a048a36c10fd2db
SHA256977df18bdc35fdcf486e62066616c46d33b32744072c554fc910ec43f3862b3e
SHA5125da231f68ae755357aedb685f6ff9fc48eef652ad863c0419e8f10def6d0ee8012f6013a0105f8ef9888f1192c4528efb3b1ea0960b189d5216b1e9b81ca6c81
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4gq1sglk.default-release\cache2\entries\nFlOHclhNAftqaTpx8THjKg.exeFilesize
2.1MB
MD5dea744f0aa75651723eb56865f83de73
SHA11d2538759bdde576a3f14ff64ffc3aad72dea14c
SHA256b83c2c235f50f817e289681268e2d92a7185148cd2d3d1592a14313473d1ce02
SHA512329cd417a4ad87dffbb35e07e44dc045b829980348e064c3d096f61f63d210110355066f3c57ca84b2e82d1b3d34398167c8e9db6bcfd974a16d327d348e3728
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4gq1sglk.default-release\thumbnails\foP8CRntXa35Qd6AwVrtxA5wrsiCkVFOVcM2oQ0QjaMLlRae7iGmIcjFN.exeFilesize
1.9MB
MD55c5616d4bcf531bc9cffc8d1b9ac8807
SHA14f42daaaaeb9f1f3fd5d63ed01fcfecb2a7bff4a
SHA25636700d09585b570480d59946a284b3dbdb64ae675a47725eba872c1318ca4fdb
SHA51276cd56094fc020e349b25028dfcba738222938b8dd15bf24c0b5169cf0bc345a473351cdc9d3d5ff6a83f2df9f8fffad50620d5a036d93662d77c280ca37aa19
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Network Shortcuts\HEO5n4iv575q8r3edvippA83IT9DOByfodbFKNUGpdaX8EujCeBfZNPXA5hHbaRA4XEfv.exeFilesize
1.8MB
MD5ca449abd4ae826b5927d0d2e3304dfa0
SHA107d4b5485a94ca21c52aea0c558e7275d0d59385
SHA2566371d719097d2fc4c97e2479c5cd059c0076cd300c5aa6a5700328f2aeae14f9
SHA512896c5164cef94dafc4d9e26fefe2b72b64fc1c69cfe41fc67a0765378ee29bd36c2bf19326a7781a7b9162082a430ee9c01c717f947e6fac815388a2048749ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Extensions\cqYL3GIKeE94AtzAr5e9qlc6Sm5Y8H6sf3NfRimcOAKtZdG7APLKSIc1AQUAfvcrxeeymHt.batFilesize
3.1MB
MD550b480904caaf3c1f3e2d61c22d3f068
SHA1ef6ef905487bd86374d6c62c14e1213c22b04a7d
SHA256d937513f933de4ad74c3191d6d287cd7dd5fa95aef8c323d744a8f6f543d858d
SHA512598d239a1a089813bc0223360547297d7127fe70d7337794b79b0c1fc388db686a3002637ca8f9f821fdb8eba84fb26cbd7c7916a9a0defa68c7fe1d274d489e
-
C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\p6Kr5wLafChYy3jkalBho0LUme59u3oW7sgUPoIwyp5tjMO.exeFilesize
2.4MB
MD5e334bdc2647102c7baa14126d5f9079e
SHA1b7223536e0fd61c5c6bb353c9fc03c9eac3a4d69
SHA256e32ed0884743514210cd35983d6e022c668d4a1da36d3830fe53d933a39629fc
SHA512ab0143b57bcc45f28e722aadc83f5881b892caecf15b99308a6ba700abd698243da29ff3797dcf693dd131d3bd23110dd88bd153b65d5ca9c09b4fc1a0c98a1f
-
\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batFilesize
1.9MB
MD5b921c800e2fa6fa51a35a8876bb55512
SHA1315ac53e6abb5ca63684a0ea5e92c446bb457ab4
SHA256940cc5d54e3c1abc5bb25712086656d7d2445a46eee1d05397a1e430fe18a2b3
SHA5123637c548129b7004e96b63427c6cc3900097df4ebec9d51ccfd75ae40924509080196a1bdeb2fdd28c097ca46504c2b677e7cf352d806d8abc5893392f93552f
-
\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batFilesize
1.9MB
MD5b921c800e2fa6fa51a35a8876bb55512
SHA1315ac53e6abb5ca63684a0ea5e92c446bb457ab4
SHA256940cc5d54e3c1abc5bb25712086656d7d2445a46eee1d05397a1e430fe18a2b3
SHA5123637c548129b7004e96b63427c6cc3900097df4ebec9d51ccfd75ae40924509080196a1bdeb2fdd28c097ca46504c2b677e7cf352d806d8abc5893392f93552f
-
\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\w7Yn4FvbZxTEOaKvpRFho22thL45caQooUMviu.batFilesize
1.9MB
MD5b921c800e2fa6fa51a35a8876bb55512
SHA1315ac53e6abb5ca63684a0ea5e92c446bb457ab4
SHA256940cc5d54e3c1abc5bb25712086656d7d2445a46eee1d05397a1e430fe18a2b3
SHA5123637c548129b7004e96b63427c6cc3900097df4ebec9d51ccfd75ae40924509080196a1bdeb2fdd28c097ca46504c2b677e7cf352d806d8abc5893392f93552f
-
memory/924-83-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/924-78-0x0000000000000000-mapping.dmp
-
memory/1744-55-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1744-54-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1860-56-0x000007FEFB651000-0x000007FEFB653000-memory.dmpFilesize
8KB
-
memory/1868-76-0x0000000000EC0000-0x0000000000EED000-memory.dmpFilesize
180KB
-
memory/1868-65-0x0000000000EC0000-0x0000000000EED000-memory.dmpFilesize
180KB
-
memory/1868-63-0x0000000000EC0000-0x0000000000EED000-memory.dmpFilesize
180KB
-
memory/1924-62-0x0000000000000000-mapping.dmp
-
memory/1924-80-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1924-73-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB