Analysis
-
max time kernel
123s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:38
Static task
static1
Behavioral task
behavioral1
Sample
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe
-
Size
386KB
-
MD5
90a111afb406a5ead8277be2a2a4ca60
-
SHA1
a6c96ecb5ee175aa33656807939748d6c5202c1b
-
SHA256
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120
-
SHA512
cb8cfe10957906fd5600fd5a805cb50a59ae1dbaec7d17d41a2ad622d3a23956e5d01c76e4391fc633c9f50dd055460c9f018ea9bc565073a5f97bb8c7987326
-
SSDEEP
3072:dSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbMtJyVdyw:ssqhJMxzJiU5SeLmNSbMtJU5
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmddescription pid process target process PID 4060 created 672 4060 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd lsass.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exeQUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmddescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\Content.Word\\DUnM5hm69ZGfHib5gWMuBqi80FvEh41dM8XIiB6K13IJCFyO1xe1QnghqmbHjGLChj.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\qml\\QtQuick\\Controls\\tLjYuobUEOcBYdEbB1xO8pkW4XzAXEIcCX7ZmEcZyVpq.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\\TempState\\KFzRBUVDu4RErcPjYCnFGIC17pglF3Aps1KQBKfJ9UKerYSBvCfkj2JkonIKB.exe\" O" QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Storage\\ext\\gfdkimpbcpahaombhbimeihdjnejgicl\\def\\Code Cache\\wasm\\av6yWkpmJxBJjxrZRRbK6GAQdXCySAj7tQ3dtiNHGnFf4sv7bk.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe -
Executes dropped EXE 2 IoCs
Processes:
QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmdQUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmdpid process 4060 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd 2348 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmdQUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmddescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd -
Drops startup file 4 IoCs
Processes:
QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmddescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FKGQQWwhgbvXvSBDuUBBAB71dqy1LJJfIbT4bnHwglPUD1dvHcn9Kw7lBJhRyF5.bat QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\zVUzKE4OG.cmd QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\C7NIoNbH5BP9xmEa5pcOAZgHbzPVAAGMtXRGDfxog1GY4LTZburlD.exe QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\A5hOYtSZWQKOJSwU2jT0pE3Z2oebWu.cmd QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
LogonUI.exeQUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exegpscript.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\\RoamingState\\l2FBL4aZ6nEbHP0fi8e68dkpCNf3hDs3kHr.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\fr-029\\YvLhHcBqoAlkq38gqgRH3QRcnhgOzHHxaNdDU.exe\" O" QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.ECApp_8wekyb3d8bbwe\\AC\\INetCookies\\FWNZNIftRpKEl5sCkwQM27A0QGZ7lOUCqz.exe\" O 2>NUL" QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy\\Jnpw9MuIFKWafkojaW6orGf96BfVT3Wkf.exe\" O 2>NUL" QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy\\LocalState\\IdNfmL7UGhwyRw4tNdx5mcUtV9LKO59i8E5TNHJn3k7ZDRNqERPQWOVtq8EDttaqu.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\data_reduction_proxy_leveldb\\bBZ5b30FYI7xBYWNdOb6y0VZsSLv6fQ.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\en-CA\\S8VRpopn1XRkUv3.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Oracle\\Java\\uVaoX63UKmoVHUW5XChSBp3zcf4ZP.exe\" O" QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Apprep.ChxApp_cw5n1h2txyewy\\LocalCache\\dFodllo5pheIAkBNFUvbNDPEHYsZcsysa3EycU99nPyPyYMpb1emqJGI.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\\LocalState\\9ZLE1k0BvAJzWqzvLb1JkEPAP4HqPGz2QSAzHvfx6DkQ3MAJJQpeiBQjIUl5QI.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\\AC\\INetHistory\\lfn4tdYb5KXZgwIYQs9oSBISZNeAlA0wGGIAUC.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\sr-Latn-RS\\btDRZzOyGqxKxHPvsvFvMOtCdMv9pqSQH1o93pJ9O.exe\" O 2>NUL" QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.ECApp_8wekyb3d8bbwe\\AC\\INetCache\\XJWSf1NpoW5ZkWnpOkMMdMtysOVZnWyu5kLJShdwS3rHSfQ74LHjTyUqbHqAIZ0BcsPlftq.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\es-AR\\rR1uvti3qHpmSClh1bRO3ZH.exe\" O" QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Windows.CBSPreview_cw5n1h2txyewy\\AppData\\U4YCSSs25o6ambbQHsds9Jr.exe\" O 2>NUL" QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\AppData\\Local\\Microsoft\\Windows Sidebar\\4NmdijAaELilwq0aAg.exe\" O" QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "169" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe -
Modifies registry class 10 IoCs
Processes:
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\\iPinDRGNEIyTVI1Vqs5pPTGXl.exe\" O 2>NUL" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\ha-Latn-NG\\wNBG2s8alv0zCb7pnhfvsH7Y5UdIwG6xzBcAM1AFMIbfzpY8AIlo5B83.exe\" O" 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Command Processor 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmdpid process 2348 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd 2348 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exeQUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmdQUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmddescription pid process Token: SeBackupPrivilege 4020 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Token: SeRestorePrivilege 4020 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Token: SeShutdownPrivilege 4020 95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe Token: SeDebugPrivilege 4060 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Token: SeRestorePrivilege 4060 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Token: SeDebugPrivilege 2348 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd Token: SeRestorePrivilege 2348 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 2684 LogonUI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
gpscript.exeQUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmddescription pid process target process PID 3564 wrote to memory of 4060 3564 gpscript.exe QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd PID 3564 wrote to memory of 4060 3564 gpscript.exe QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd PID 4060 wrote to memory of 2348 4060 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd PID 4060 wrote to memory of 2348 4060 QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Users\Admin\.oracle_jre_usage\QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd"C:\Users\Admin\.oracle_jre_usage\QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
C:\Users\Admin\AppData\Local\Temp\95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe"C:\Users\Admin\AppData\Local\Temp\95fc29a4fb401d3afb329b7f805449a482433dbe96a920f1cd85e254df151120.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39f2855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2684
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\.oracle_jre_usage\QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd"C:\Users\Admin\.oracle_jre_usage\QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmd" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Diagnosis\SoftLanding\Xgvi9kJwL7XlFslRjziUfU99BBYuyYHSpgItT6R.cmdFilesize
1.3MB
MD5cff2e5d3b437f9f689311032929bd90f
SHA1fc12d7ed236a8e60f89f27c18574f56a2f7b41aa
SHA2567089cf6dd3268720b54401e741764a74f7da7636fc033d3cd5e59b9c43ff892e
SHA51257257d401ddf3440756b99bdeb22bbbb832454e43c7d465c1ddc8aa68c2bc1cd1bc440bdf9103adde7f5d4939a9457aa30b686552d5788fb2933bc154ed3a2f3
-
C:\ProgramData\Package Cache\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\packages\vcRuntimeMinimum_x86\l0dmHseIlJXHy7zoNzth9q.cmdFilesize
671KB
MD58a6fb09fd74c5040e4d4f47077502609
SHA1e23be976a97777df6518a75ca1981f8be8f29435
SHA2569a283b05d4d3f680823329efcf14eb6a5337078f5595352213935ed62d0c3932
SHA512902323ac25dd7e3164f3054fb2035df0752724fb72e82e1fcfd8453861805f73783bd36a955fa78e435e19b4b812738718830497c95649cfc9c33ddf8ac14444
-
C:\Users\Admin\.oracle_jre_usage\QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmdFilesize
650KB
MD5e52a67c1d789b9099760fdccc44b2cdd
SHA1f0dc8a76916d15f216e9818ed244ea194ce56341
SHA2569a9d5c8d376d612b592e3578bfd37866366c2fac1b06ceb1a9b5f58a3df771b7
SHA512783039014007303429197530e07a7df7939b4863bdb1bc5b0d71ec7e3c5f8c5a1088d16217f3a0bd6f28c127460477d4b1204c96bf9adac8c3197a77dd521607
-
C:\Users\Admin\.oracle_jre_usage\QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmdFilesize
650KB
MD5e52a67c1d789b9099760fdccc44b2cdd
SHA1f0dc8a76916d15f216e9818ed244ea194ce56341
SHA2569a9d5c8d376d612b592e3578bfd37866366c2fac1b06ceb1a9b5f58a3df771b7
SHA512783039014007303429197530e07a7df7939b4863bdb1bc5b0d71ec7e3c5f8c5a1088d16217f3a0bd6f28c127460477d4b1204c96bf9adac8c3197a77dd521607
-
C:\Users\Admin\.oracle_jre_usage\QUMM9kFpuacwsKnuoYjvQdWYQsEcJwNBLu.cmdFilesize
650KB
MD5e52a67c1d789b9099760fdccc44b2cdd
SHA1f0dc8a76916d15f216e9818ed244ea194ce56341
SHA2569a9d5c8d376d612b592e3578bfd37866366c2fac1b06ceb1a9b5f58a3df771b7
SHA512783039014007303429197530e07a7df7939b4863bdb1bc5b0d71ec7e3c5f8c5a1088d16217f3a0bd6f28c127460477d4b1204c96bf9adac8c3197a77dd521607
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\bBZ5b30FYI7xBYWNdOb6y0VZsSLv6fQ.exeFilesize
422KB
MD5479091e1daabaf2b6c9576f89482dabe
SHA14db600483c03b8160635ae1e2bee51dfcfc1c32d
SHA2569dd37ddeeac3425b4055d18e7bea78484d924e92fca997a3a89c783c1ed0b91f
SHA5121006dbe935563bbb63bc3bad308386d57a7e984046e1214c50b31749b2b7c15a3d7019e01f9f303c0d098261e718914e967c6d3c251a9384a7c2caaf01259a04
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.Word\DUnM5hm69ZGfHib5gWMuBqi80FvEh41dM8XIiB6K13IJCFyO1xe1QnghqmbHjGLChj.exeFilesize
406KB
MD504189baf76608a13a42455b3567a8f67
SHA194cf8b19855ee65c9c28594ead70001b44f8dcf5
SHA25661bd3def7b87f2be7f0e83d0710ba6536b3da42f47a7af14b8cf1a2c860d2a88
SHA512331fe2b247775e2eb85eedcce9845f03b8f64dc62effdf7465cf24f3606a244f3fe655a1619dffeb4560a5ed4e9910a261bd88cb7ad3c8155ebcba0750e12349
-
C:\Users\Admin\AppData\Local\Microsoft\input\en-CA\S8VRpopn1XRkUv3.exeFilesize
756KB
MD5df438f74f3d114a662f5bdd6247fec98
SHA1a2c558121e84cd347bcf67b00c71a44db21ce5c5
SHA256f4b674c683b73681b4309804dd80cccf33fc4c06263154c28e85cfbac60a5a50
SHA512a0ea3b2275fe6428ed568acd6d34c62189213374e5dc3d646f09c44502f66c43d0cb197169f6fdff10ef291cee5e1fa7a01944376dd04460bbc8e640d821f643
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\INetHistory\lfn4tdYb5KXZgwIYQs9oSBISZNeAlA0wGGIAUC.exeFilesize
546KB
MD5948857f9f7a33ae1bfba6254faa93799
SHA1b95bcd9cbb0d242e140f270597f32ce59a995858
SHA25627a104d72766ae50b17a26e6822a95f3e0974af12a2b2461e93df4591314ae2b
SHA51260b1277f62b9532aba1e897def898dda56ab067c87241da69c06c2d76e215edeb84573f030c0783c31aacb2e968a6f281f9d39e45d7596f1bad673f7a91b1136
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Apprep.ChxApp_cw5n1h2txyewy\LocalCache\dFodllo5pheIAkBNFUvbNDPEHYsZcsysa3EycU99nPyPyYMpb1emqJGI.exeFilesize
476KB
MD57ddf2d05b9ee1329f9a5871fdecf35eb
SHA1e3cf6e156f6dee8503b315e613f2b943fd69f63f
SHA2561e864f082f1d7bf403217013dd1c4f8508857419ca4c1d7fb8f795daa09c2d3c
SHA5129093052eaa6bfc4f932e20104620c2508ce5484dbaa7990185f608e0e4b10ee6cb2bce3efad600e3966cd2f72d1b9bfd5a4bd88125857498d6e1a6295f24c701
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\9ZLE1k0BvAJzWqzvLb1JkEPAP4HqPGz2QSAzHvfx6DkQ3MAJJQpeiBQjIUl5QI.exeFilesize
732KB
MD5c6393aa89e47a96268d345b58ba45b86
SHA1904dce73bcf8edd2c5179a5664b3efa3378c21ef
SHA25639002027a7b6f603ea209da338eeaf908aece24f59dd62293305a14abebd95c0
SHA5122ec1534b3fe5f6bf53b05ae85b83a294ea512c8958fea828366dd94242adc78f94086fd209dba37413a7b4e5993b49cc4bfe63103ed02a11e3b6bb40758ef63a
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\RoamingState\l2FBL4aZ6nEbHP0fi8e68dkpCNf3hDs3kHr.exeFilesize
680KB
MD577aa2ce0267c8773185a3df622636b0e
SHA1586802323d9b2c20c50f27b7b92f98cf5d681f63
SHA256899499037ebfbd440f7c6a69678da272e3661f4c2ec05b224863edf9da275f9a
SHA5124616054e1f363a1b34f464ba4a75dea0083b91897cfdb6f3e641a60ee99efe7d485b499a8a089a9acd1353ac80f3b606df0003b564da6e271a2647d78c6f850e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2629973501-4017243118-3254762364-1000\1dva9nQupIBLvdq.exeFilesize
739KB
MD599cfc4a1ec55bb112ec52e77c3e8445e
SHA110dc9de7e8cc48997d3b815c527a164b5b63fb5e
SHA25671fcf539b40e5f052fa42e509bcabafab9f73c05ca8f940c9e677c7359c95c23
SHA512fb57379ad7c67ea8b38634f8f749f370268573118bd1ed1bddbdc11ea714a1095695ddc3dfa64e284612c3fe1dbaa9296f4f3b74e970d04bafa1e1f0465eacf7
-
memory/2348-147-0x0000000000000000-mapping.dmp
-
memory/2348-152-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4020-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4020-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4060-145-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4060-146-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4060-149-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4060-134-0x0000000000000000-mapping.dmp