Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:38
Static task
static1
Behavioral task
behavioral1
Sample
ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe
Resource
win10v2004-20220812-en
General
-
Target
ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe
-
Size
522KB
-
MD5
4abdf9379ca35522f5d426840aee12cb
-
SHA1
8a82210b16774ea2e974b003faa23473cdb26a2b
-
SHA256
ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf
-
SHA512
46e45982dc4aa5bd9107a076d24f49d0451214a49eaf6b92f42bbc4b24ad6ab68a07a0b45e19fa765dba7631b14892f028cc20d0992637ff54c58046c9815eb6
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batdescription pid process target process PID 3724 created 672 3724 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat lsass.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\FXXxg9NS2tLUSG2.exe\" O" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\PlaceholderTileLogoFolder\\73Cu8QOVsQe2H1Z5qGEa4HtQQjUjwccwzv.exe\" O" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\E2A4F912-2574-4A75-9BB0-0D023378592B_cw5n1h2txyewy\\AC\\Temp\\V5RNyIRLIQDzX.exe\" O" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\45\\XLtOjRNqxx1f0qMVF.exe\" O" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat -
Executes dropped EXE 2 IoCs
Processes:
x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batx6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batpid process 3724 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat 2380 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batx6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exeLogonUI.exex6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batdescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\AppRepository\\Packages\\Microsoft.Windows.CallingShellApp_1000.19041.1023.0_neutral_neutral_cw5n1h2txyewy\\Td5w5vVfvMSQ2JDWJRJM8QZ12KyuBIoEbuOMgjzqlLbOVSjvOwjep.exe\" O 2>NUL" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\fr-BE\\1kgRA06yLRpZH1EUFRcwOsgQ3KeY8CsypGQIRMYq9R1kguCTB5Ph.exe\" O" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\CryptnetUrlCache\\PbeBCRqaQSmgWe41Pt85OqeGQDt7mHUEevG8cpBtkFFG6CVLMxeJCURK1Jhvfvr2cU.exe\" O" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\7\\P5Y5fszz7ZWIuKQXFWQHfKCqBSOOl8FyNMUzYKxsETZOUqS8e.exe\" O" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\data_reduction_proxy_leveldb\\NiF7V5O76zocCXpcDrRgoRY7JOBwBnDRUp5N8JFe.exe\" O 2>NUL" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\\RoamingState\\SdhN8KR8e1ujoXQQlMEVMnq66Ji3tNreNGk7oRpIjQK.exe\" O 2>NUL" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\TargetedContentCache\\v3\\353698\\xC2h9i6soy.exe\" O 2>NUL" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\9MeRFIoXbwsuzNDF0UL8FfUoZW4CFpsqdFn1YCODOTc6DBkS4abunjTxRpESD5k9.exe\" O" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\.DEFAULT ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Printer Shortcuts\\ciFMff26Tta6HgvizHngPXu3eVe84U70RMo2mRuJ8OGT0Ygnvp5.exe\" O" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\mozilla-temp-files\\wYjoKLiPUPS9vavrIOKvNik4sEV1q4EeaW7gUWgLkEW44XHMQoH8jt3UIZWB1ytKsxD4.exe\" O" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-19 ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "169" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\ru\\OVBFOLa5j1BU57uj.exe\" O 2>NUL" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Package Cache\\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\\rDTCa0YShB9LcogrZsUcVpQCVZJM94Ai2jpKlB8TSblQOyPxiYJ5K24NNTRVSaUOK.exe\" O 2>NUL" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\LocalState\\ConstraintIndex\\VSv4rbbhqv6Umprogk5ZnQXxcGZ1Ixiu7QQLP4rUyKtbeqAJuRvxSquq5a.exe\" O" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\12\\tAzcZmInMGdf9z0tGypdHCzgUhNuWmJh.exe\" O 2>NUL" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\0PizCFzBAdq32LXX3R9jn.exe\" O" x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Crashpad\\reports\\TSBdJ0i4eJ.exe\" O 2>NUL" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-20 ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe -
Modifies registry class 10 IoCs
Processes:
ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Command Processor ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Storage\\ext\\gfdkimpbcpahaombhbimeihdjnejgicl\\def\\Code Cache\\js\\W03x9ORYHVhf0MhstMbsN2Trk2PZHDBLXpaG.exe\" O 2>NUL" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Config\\kadHREXPHW06i5c45Zf7uNNKuNVMCENxiYBNtg0.exe\" O" ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batpid process 2380 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat 2380 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exex6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batx6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batdescription pid process Token: SeBackupPrivilege 4848 ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Token: SeRestorePrivilege 4848 ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Token: SeShutdownPrivilege 4848 ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe Token: SeDebugPrivilege 3724 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Token: SeRestorePrivilege 3724 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Token: SeDebugPrivilege 2380 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat Token: SeRestorePrivilege 2380 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 4568 LogonUI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
gpscript.exex6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batdescription pid process target process PID 600 wrote to memory of 3724 600 gpscript.exe x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat PID 600 wrote to memory of 3724 600 gpscript.exe x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat PID 3724 wrote to memory of 2380 3724 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat PID 3724 wrote to memory of 2380 3724 x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat"C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
C:\Users\Admin\AppData\Local\Temp\ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe"C:\Users\Admin\AppData\Local\Temp\ab06f96ea33cd450a40c5babb204064ea5b21397713fb705ecedb728ffd7b0bf.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ea855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4568
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat"C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.bat" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Diagnosis\Temp\dd3FHKlEGYwEDb2OqPSSk.exeFilesize
763KB
MD5ecbd6470ce6762146a7314c50c580692
SHA17238b0ee50386fd4d2f51740d056525d3adb61ee
SHA256a1c86bfbf6dee415edfa3225cb8496530c7cc0d290def15926bf767aa2553fee
SHA512d9e826acaa72f36237e478e40e0ea78fa4f3362808d52a5af6ff4cfad89ac9b46f65d3f4b512882ad85a5e92e160122cf7dbdf14b6fb7bf390693ba21883129a
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\P5Y5fszz7ZWIuKQXFWQHfKCqBSOOl8FyNMUzYKxsETZOUqS8e.exeFilesize
862KB
MD5995e506aec0eb18d7cdd7c1491fc27f1
SHA1fd5b057c72e4b38518bab6edacfbf3d58a8bf4ec
SHA256578e5438689df7beba6abebe087bc7df5f5dd43f71b8140bb89b0623e0b8f213
SHA51205c27b6109d502c0a4f6ff7ea279d624e615aa79a5dc25e04dc790503d1b223fe715e6765043c36685f33d39c15d6e9f9248f8301e2ba8cc534c994520065081
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\NiF7V5O76zocCXpcDrRgoRY7JOBwBnDRUp5N8JFe.exeFilesize
603KB
MD53c256189b7e147944d5ea8958cc775b3
SHA1bc226424b15f7d2721383af71b7e56d2f6f69e50
SHA2568d0ab2c80242a7d123bb00c03ce9f3c43c2df1693946b8dbaa62604ca7fbea52
SHA51231a05a7b7410e88732739cb31a353028ff2956761be2130aea0266da168129395b43fdd9b52d7c4311dc6a8a7ead7b239334c42efb6c6fa5da8d797d93e3c996
-
C:\Users\Admin\AppData\Local\Microsoft\input\ar-LB\zxJWmYcPOAnnfnEnFhLYPb2xKR8mX7J3TaDgKHyDjaXnfU00pWxHWEdQvqI1MG9IK.exeFilesize
733KB
MD508d3044b226b40e5fc1a372e2f496120
SHA10e5e95515e937fb226276d9d69ea92f6cf05ff03
SHA256aa1399b955d4041e34571758d7f4494e358a969a57c04e505cfe6562a4a07ad5
SHA51292dec0003245c1c4d34a89285d57f278e5998fed574309b1e5ad896bb95e7b388f339b2afd9a5e370853673b99f7102e2fcf76aa0df4b5a7bb138613d4ed41e0
-
C:\Users\Admin\AppData\Local\Microsoft\input\es-DO\EEQeWhVtAlI8qYx5LRi7cTLhPaqlnqVJZic8t.cmdFilesize
1.2MB
MD57f041c47bf607482094e9c674ef0f8e3
SHA1bb4738f5df86a1d4e8f217722b738fb04b785f60
SHA256029ea671b91d663b40874571ccacecaae444e7d939fb1438a8d3fc31048596d2
SHA512fe9603e1702841e86adfee08a0bd8d2ba5d88ffdc0477373a4e940f00e34fb18ea7a67e8af5f2933ca4d4f663c946d45142b5cb81eddae95375e9b5f5fd7f8d5
-
C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batFilesize
643KB
MD5f4a2ad02f020962a79d54d5c6cc0b3f9
SHA1d25c019774862381f4ebdc1d03e7b58ab83b2e28
SHA256f0f22e60b457520bcf641d60e5890ed55ad71a1f5d15532dfe850ae5487e2610
SHA5127ee3e67937db97e2ca00d4dded0bfbf817cb9ba7a8fb11f6292034a8ffe90ce94ad66413ec66cad0bba92aec2b9e1f4757f385d9ddd9f1b721c412e53829eae4
-
C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batFilesize
643KB
MD5f4a2ad02f020962a79d54d5c6cc0b3f9
SHA1d25c019774862381f4ebdc1d03e7b58ab83b2e28
SHA256f0f22e60b457520bcf641d60e5890ed55ad71a1f5d15532dfe850ae5487e2610
SHA5127ee3e67937db97e2ca00d4dded0bfbf817cb9ba7a8fb11f6292034a8ffe90ce94ad66413ec66cad0bba92aec2b9e1f4757f385d9ddd9f1b721c412e53829eae4
-
C:\Users\Admin\AppData\Local\Microsoft\input\es-MX\x6oifpdfAEQSDmHjJsHrM5fngR9QWcGLiFu7Qkr.batFilesize
643KB
MD5f4a2ad02f020962a79d54d5c6cc0b3f9
SHA1d25c019774862381f4ebdc1d03e7b58ab83b2e28
SHA256f0f22e60b457520bcf641d60e5890ed55ad71a1f5d15532dfe850ae5487e2610
SHA5127ee3e67937db97e2ca00d4dded0bfbf817cb9ba7a8fb11f6292034a8ffe90ce94ad66413ec66cad0bba92aec2b9e1f4757f385d9ddd9f1b721c412e53829eae4
-
C:\Users\Admin\AppData\Local\Packages\E2A4F912-2574-4A75-9BB0-0D023378592B_cw5n1h2txyewy\AC\Temp\V5RNyIRLIQDzX.exeFilesize
813KB
MD57b17f009ff2096282b72a14c1d819095
SHA13e8d832df5533adc88b833f9f9d356108b0d06f4
SHA256390ce337718b2a4d8c7f58de64943bf44a21b27b54d675285e1580cfefd072c7
SHA5123e7f1cec7d761bdd9d636bfe396d18ce1fa16e8be0aca283a8b46ca068fc8183fa3c5c08f147d2be24003e2375c4449ecde4134f7c13e63e7e710a1085d1f6a3
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\VSv4rbbhqv6Umprogk5ZnQXxcGZ1Ixiu7QQLP4rUyKtbeqAJuRvxSquq5a.exeFilesize
674KB
MD508e3dabf97f759b4e891b671fd6d4739
SHA1c3c532ff563f2bea0161da207238fa9331ef288c
SHA256ae5d3a525828f24272db54466cafc98078f6af11f8dc727b868864310a5d0508
SHA51278b08bf75d208baff952aa37b2a4a73b27a9996d6246cfb56922cbde38db2618bec0ed143a85d0151acc9b922cc881607574c2c339ad2ff7440dee1bd7dc33d0
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\RoamingState\SdhN8KR8e1ujoXQQlMEVMnq66Ji3tNreNGk7oRpIjQK.exeFilesize
804KB
MD52806b19973af267b0dd8cc26e3d2f07b
SHA1a278eb2879e65225bae656071bcd8f6293a19007
SHA25677c90f832062678019fd3a424cab68c8fba5191ca2184f0673725ea09d4c0d6d
SHA512e66fbf358843cc2be97c76bffc3a088c3808ba3f3ec4329eab6275797ab03d83fa364f64110902d99a634e5f91d0c33724335e57aa4d7dcfe54a71552f6cf807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\9MeRFIoXbwsuzNDF0UL8FfUoZW4CFpsqdFn1YCODOTc6DBkS4abunjTxRpESD5k9.exeFilesize
809KB
MD54821339f7eafc1168f454401fdf3648c
SHA13d1f4a7656dc567784ef41e4c9791ea70b25ad87
SHA25636b74b4436473fe8dbb5b82d6d2bec132060a34c824c4b44a3c023698c2326af
SHA512d6fc16a925139dfc641aa8221d99a27a9c4446c49ec07367215ad4a06cc1d6b6694d5e7f2e1808987dfb261212b91cd7ab9c5f499a9b9524f2481e27d47d695c
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\NaLIfcl4rft5VYlisVybfdr60kwravXcpVGq6An7ZJarTCS0Wv2QezhDYIJwcl5dY4nTaq.exeFilesize
935KB
MD56758d97120ea967f9614acb19967a893
SHA191f39903226a98fcfd9362797d8794ddc9f995cd
SHA2563840e80e71066af559c6ffa695ee4fbd691859246129af65759de03259888216
SHA512d18f7451fd2c41c0dd987383e1acfbdad081e57d73bb4d63fe4a18d85c83f4cac22c66289b03d0950fd1828572f141482295782e2bc00613a64e13ccb5f36264
-
memory/2380-150-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2380-147-0x0000000000000000-mapping.dmp
-
memory/2380-153-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3724-146-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3724-134-0x0000000000000000-mapping.dmp
-
memory/3724-149-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3724-145-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4848-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4848-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB