Analysis
-
max time kernel
61s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:24
Static task
static1
Behavioral task
behavioral1
Sample
e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe
-
Size
1.1MB
-
MD5
fcf2f679e2b3bfeafaf385af4a25eb61
-
SHA1
a5407da3447f9fa11c4541892efd7e0582349fe7
-
SHA256
e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a
-
SHA512
56821b24a31ed75c6bd2683c8046c0c1ef66093205f9f1f2282246c1ef131df86889405f7692ea42c1e5c8ef21502aa159e045f6ad6a5fceb0f4fb7ff73a5016
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
8eSXDmUVik92.exedescription pid process target process PID 804 created 656 804 8eSXDmUVik92.exe lsass.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe8eSXDmUVik92.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Windows PowerShell\\keQgJZCwfK3ukbzttkcvxHj0TR7VB0Zuz.exe\" O" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\AppData\\Local\\Microsoft\\Windows\\INetCookies\\h5BHy0j0xeUROj4Tg9GK13bejvDCWGi6LfUQ.exe\" O" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8eSXDmUVik92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\AppData\\Local\\Microsoft\\Windows\\CloudStore\\0ozc6Ug3F60p4skpazyydP0uMDuFRiK7FIchoquD3HXTFDYVlStk4xVgN9KDVoE.exe\" O" 8eSXDmUVik92.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy\\SystemAppData\\CPAr3q5mMDushdV9iqL0W1MqmNr0TspqJfQM2UApgz0eb43A9I390VH54.exe\" O" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe -
Executes dropped EXE 2 IoCs
Processes:
8eSXDmUVik92.exe8eSXDmUVik92.exepid process 804 8eSXDmUVik92.exe 2456 8eSXDmUVik92.exe -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
8eSXDmUVik92.exe8eSXDmUVik92.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " 8eSXDmUVik92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe 8eSXDmUVik92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " 8eSXDmUVik92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe 8eSXDmUVik92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " 8eSXDmUVik92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe 8eSXDmUVik92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " 8eSXDmUVik92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe 8eSXDmUVik92.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
LogonUI.exee03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exegpscript.exe8eSXDmUVik92.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 8eSXDmUVik92.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\6wx89zth.default-release\\minidumps\\GdKVWmHXTWFJdvCAX9e8QnKLYRgvuHFw.exe\" O" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.VCLibs.140.00_8wekyb3d8bbwe\\AC\\INetCookies\\PxyNHH30ArAWag66.exe\" O" 8eSXDmUVik92.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{4234D49B-0245-4DF3-B780-3893943456E1} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 010000000000000010efadf9e100d901 8eSXDmUVik92.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy\\AC\\2yokN7TlPfSoruqaBUuBiZhiWRzcMLDDgUJWZo95uni.exe\" O 2>NUL" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\System Tools\\mcro4I9L3JArOBGPGPABbUjFyWgFUlqPOhpE23J1MgNuzlP4LydfL.exe\" O" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\DRM\\hKUiF72uLotwwj11OedivVuqszk4yCyF6rHbUdWzX7vPSrlXEAcUIGq25.exe\" O" 8eSXDmUVik92.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached 8eSXDmUVik92.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\az-Latn-AZ\\l2L5yS23D.exe\" O 2>NUL" 8eSXDmUVik92.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Edge\\User Data\\Default\\Sync Data\\LevelDB\\1VOBvnJisXBYCWLj7Crh9ZKWwNdWFg4oJPBvBUn6tA6kcoFb1sfV8x6dCuFFKnHnS.exe\" O 2>NUL" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-19 e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\18\\4S5gbF55ZPGbKBTLyasvMrXVxRB7XPM6bNkZBSIG5fLH9n7.exe\" O" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy\\RoamingState\\uLqfivYQL9A2sg9.exe\" O" 8eSXDmUVik92.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\lszq8vENMXpQcuUleFIaxTQN0c.exe\" O 2>NUL" 8eSXDmUVik92.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 8eSXDmUVik92.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8eSXDmUVik92.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309dac0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\AppRepository\\Packages\\Microsoft.AsyncTextService_10.0.19041.1023_neutral__8wekyb3d8bbwe\\MrRufc4be6Qg9vIFQIABCBYeIMbWBQbEpSZrDKkiDCQ8DjUSCK9Yla7HlIj6.exe\" O 2>NUL" 8eSXDmUVik92.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8eSXDmUVik92.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Provisioning\\AssetCache\\ZlEg1WC6fyOHfnemTi0kbHtSXV22aYPTq7kOxBKvg5ggtQ3pJyJkYyW.exe\" O" 8eSXDmUVik92.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "182" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\AppRepository\\Families\\rTQ2J7eaekI8cp.exe\" O 2>NUL" 8eSXDmUVik92.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\sr-Cyrl-ME\\5RBPIcL4wqHuGC9PDOQHPBJZ6.exe\" O 2>NUL" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\\Settings\\OobdFpL5MH8YnvQF62RuLuTNhPDuR5CeTKxCwwEC2zj.exe\" O 2>NUL" 8eSXDmUVik92.exe Key created \REGISTRY\USER\.DEFAULT e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Network\\Connections\\Ja5DJWtEJrjrdidEthMMTflDA3FqKE0dx8HUpSKtxTpl6QRhCMZeHAhwd.exe\" O 2>NUL" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8eSXDmUVik92.exe Key created \REGISTRY\USER\S-1-5-20 e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\\packages\\vcRuntimeMinimum_x86\\xD01InRqwfCd4wYKJaCOeWkRBSiWRVzJXx5Xzq6PXTvCC.exe\" O" 8eSXDmUVik92.exe -
Modifies registry class 10 IoCs
Processes:
e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\\TempState\\ZzZ6n2qvMigrqDdD9ALErjTYFsISFZWhFR2rAOy4NpW.exe\" O" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Command Processor e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\\LocalCache\\5WghAgSPOZrkU0g8Fs7Av5ufgFerc4nFsKJORlmuyzCCp66q3CUhg.exe\" O 2>NUL" e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8eSXDmUVik92.exepid process 2456 8eSXDmUVik92.exe 2456 8eSXDmUVik92.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe8eSXDmUVik92.exe8eSXDmUVik92.exedescription pid process Token: SeBackupPrivilege 4440 e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Token: SeRestorePrivilege 4440 e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Token: SeShutdownPrivilege 4440 e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe Token: SeDebugPrivilege 804 8eSXDmUVik92.exe Token: SeRestorePrivilege 804 8eSXDmUVik92.exe Token: SeDebugPrivilege 2456 8eSXDmUVik92.exe Token: SeRestorePrivilege 2456 8eSXDmUVik92.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 756 LogonUI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
gpscript.exe8eSXDmUVik92.exedescription pid process target process PID 3924 wrote to memory of 804 3924 gpscript.exe 8eSXDmUVik92.exe PID 3924 wrote to memory of 804 3924 gpscript.exe 8eSXDmUVik92.exe PID 804 wrote to memory of 2456 804 8eSXDmUVik92.exe 8eSXDmUVik92.exe PID 804 wrote to memory of 2456 804 8eSXDmUVik92.exe 8eSXDmUVik92.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Users\Admin\AppData\Local\Microsoft\input\en-TT\8eSXDmUVik92.exe"C:\Users\Admin\AppData\Local\Microsoft\input\en-TT\8eSXDmUVik92.exe" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe"C:\Users\Admin\AppData\Local\Temp\e03721ab718cf1b59d47a92fe10cf3e385267ec1c632b6a293f511e61348746a.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39fe055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\input\en-TT\8eSXDmUVik92.exe"C:\Users\Admin\AppData\Local\Microsoft\input\en-TT\8eSXDmUVik92.exe" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Network\Connections\Ja5DJWtEJrjrdidEthMMTflDA3FqKE0dx8HUpSKtxTpl6QRhCMZeHAhwd.exeFilesize
1.3MB
MD5d6a8981df103b24fb61dc933e1f6134d
SHA17feaccbc8a08e69e8b7836892937c1397390d994
SHA256bfca03d0be0ab9c9f3af754c56b2330cfb33f1a4026c4b9fa861ff2a27f75f6c
SHA512d760326f597c352067c11ba082dfdd52b533b9d73d41cae2e09af8054bb0126220a34c4a3a53fca0fa5bf2a8596a34e76b12e05dcbafd8efdc6ce6168ff29519
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18\4S5gbF55ZPGbKBTLyasvMrXVxRB7XPM6bNkZBSIG5fLH9n7.exeFilesize
1.5MB
MD51400b41b0d909e660613f7e65c38f391
SHA19ccbd6c6075ebe9ba8b6aa83d4cb7bb1e201c82c
SHA256df24968f14da9eb100015c27625851fec4e7fbb47a646fd3c47fc9f22b24b3d6
SHA512e3e42ca55925317e860b9dc6cf94fe35333cf1bc96b36a3092e3863a1c89f39ab264ad70916d406b9e6a222b46b3db880068b93663362aef32d2265974101409
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\1VOBvnJisXBYCWLj7Crh9ZKWwNdWFg4oJPBvBUn6tA6kcoFb1sfV8x6dCuFFKnHnS.exeFilesize
1.2MB
MD58b3ede3e142999403c4d2330d0e6874d
SHA1eb8c52550f524380d83db612ade6f43a3de5eff4
SHA2565c86fb1a67218aeb6572a0fb8a9f30dc70ffe26c7b6e4fd901fadbbc2d0bad31
SHA512bdd2941c17a8e56b2f536a5d7dfe7ad029a60360eb7600074359a746d61767fd57bae23b2394402252ffee445725143f2542003c46e5e9a3c976297b1471f0a6
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\lt\Y0a7NSyZvBuwW9DnMShCVyrJ031jNeEUjHPr.cmdFilesize
3.1MB
MD5cf6595a3394330fcf3d0ce8e2d2de83f
SHA1a4db7b034cbe059a8340feaa68a6e2d6f0c0479c
SHA256cec5c88109477e597a75e2711df324eff2a0100bf2cbdc9d04374d28339e236e
SHA5126597df0a44ab525bea09ef4a060a381326110ca71a204bb7bfc1b37965a44c390bea074445767e25da2811f378e12b7669f0cf011c8bac1a2e23fc5cfff8baf5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\PoOiPIWaTKmXHfHNVy6wnvVqcqJFfy6xgvhyoKi6f6QE4UkL.exeFilesize
1.4MB
MD5fe17dba9e6ea7765e7af6617ff29f026
SHA1566a92ddedb907b0e1d006e1c248f9112465579a
SHA25669fe510b7beb17d5ae1e91bacd311cd8cda1b9cb5cdaebe9ea43cf92e4ac5aa8
SHA5126319d96aaf4311a4b4c9833c8afa3be1a6e02f3a10c53ae7ddd6744018e5a24fcffaf3dfbed5a329c77955b68b0d1da89db4d0723546aa7fb13db5e9daad256b
-
C:\Users\Admin\AppData\Local\Microsoft\input\bg-BG\mUlEdwpRM103TSglztjhbiH4qWlbdKIaIDf2d3WPU8GO5kQzMsLEb9t.cmdFilesize
2.2MB
MD572d5e9a0e6246e22460ddd2d4e8eac24
SHA1eff8299fc26ce54fcb62c098d14930f25f5543b7
SHA2560a7ac46a0a07c1e894554c50f119cd81737a16ee0525128ab8086b88ca701017
SHA5128098337682cc55769a8b72aa2f3a8e77d4a2636982b12250a258f47f13be47d92d9b1c6a7696f51316f6e15ee196129e131a9208e54644c831c7b17425a86092
-
C:\Users\Admin\AppData\Local\Microsoft\input\en-TT\8eSXDmUVik92.exeFilesize
1.6MB
MD51fdb04a92080cc1406dc63e346f1dd1f
SHA13f2783803fe45bfd91112ee5aa78218bddb60d6f
SHA256b65f04f23feab75c1ab309c8efc2b632dbabff048a0f483a0d8abd9a37a6b89e
SHA512b1ddfc541eab3fe7e2892d7fb758196e47a43dd3ba0a339185626d7d15535fc50362720d8a0ed2ca009498ce92864626d9331cf7fec66caef6f6517ad72a97aa
-
C:\Users\Admin\AppData\Local\Microsoft\input\en-TT\8eSXDmUVik92.exeFilesize
1.6MB
MD51fdb04a92080cc1406dc63e346f1dd1f
SHA13f2783803fe45bfd91112ee5aa78218bddb60d6f
SHA256b65f04f23feab75c1ab309c8efc2b632dbabff048a0f483a0d8abd9a37a6b89e
SHA512b1ddfc541eab3fe7e2892d7fb758196e47a43dd3ba0a339185626d7d15535fc50362720d8a0ed2ca009498ce92864626d9331cf7fec66caef6f6517ad72a97aa
-
C:\Users\Admin\AppData\Local\Microsoft\input\en-TT\8eSXDmUVik92.exeFilesize
1.6MB
MD51fdb04a92080cc1406dc63e346f1dd1f
SHA13f2783803fe45bfd91112ee5aa78218bddb60d6f
SHA256b65f04f23feab75c1ab309c8efc2b632dbabff048a0f483a0d8abd9a37a6b89e
SHA512b1ddfc541eab3fe7e2892d7fb758196e47a43dd3ba0a339185626d7d15535fc50362720d8a0ed2ca009498ce92864626d9331cf7fec66caef6f6517ad72a97aa
-
C:\Users\Admin\AppData\Local\Microsoft\input\sr-Cyrl-ME\5RBPIcL4wqHuGC9PDOQHPBJZ6.exeFilesize
1.8MB
MD59bec4e7f8885610c6fc41576f4233cbf
SHA185f1b26770193dcbf0ca1fd049599ed2fec2e4ff
SHA256245fb314c1d3ede5d4604a1560dc7b20569bc8af78a3cfd421f9d104335496e6
SHA5128889b5a1bd4bb713924eb20a310f78b99d852ca06220efc5203db58460a1136fbf9c1ac8c4e4d1e66a210138e0ccfd18ec10e44362ac07e65389a0915e3e4a9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6wx89zth.default-release\minidumps\GdKVWmHXTWFJdvCAX9e8QnKLYRgvuHFw.exeFilesize
2.2MB
MD5f351692b7951f100373a6f77b57e5b2b
SHA1350a081076ee3a4eaa288a44acea8fafb321b94c
SHA256493c32bbaa61257cef194da24212c8ddd42ee4be9badb074a23cffa72abbc45d
SHA5121bb8ed0ce36642b8ebc7a33d914ea5c5029c8d4258f36022129f01804193ea8d62eebef1f3c7baa66adad5880de5df5b33fad2b21654db1955fc5bcc7cb76b51
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\mcro4I9L3JArOBGPGPABbUjFyWgFUlqPOhpE23J1MgNuzlP4LydfL.exeFilesize
1.6MB
MD575b4b4ecccb7296d0e02dd5b8be39c54
SHA110ad519af0db9dab4d8023e2daafa26685eee42a
SHA256bf728339510d07a26818bf81a5bfdf1e5da9b6cbb94acb0914b751fc0879e715
SHA5123ec1c9d0383fe07276b970d66b01ed1c1880a3a7cd87676f1277fc986a846798fc0b9cd5fff2eb19bee7e741f0131333cb732c6cfa6b72208cb54b94dc313b4b
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\keQgJZCwfK3ukbzttkcvxHj0TR7VB0Zuz.exeFilesize
1.2MB
MD5e6c80bcee4d6c1b362082434f5aa7675
SHA1825580e9ca8088e93eafe45cefe4a690ca2d0995
SHA25614f7cd5f5cacf660d1d18b9e969b910bc91099effc02b5ce31d0e26c24a2989d
SHA512be3589e2736b6001eac6dbfc0c307d0d1f1d862d561207913010d6cf818265ca25e0ca07f2b4c71cd4118d71c247051c9c5d1096d00ab8bcddb9d762a585c9b8
-
memory/804-136-0x0000000000000000-mapping.dmp
-
memory/804-138-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/804-147-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/804-150-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2456-148-0x0000000000000000-mapping.dmp
-
memory/2456-151-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2456-154-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4440-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4440-134-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4440-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB