Analysis
-
max time kernel
87s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:41
Static task
static1
Behavioral task
behavioral1
Sample
f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe
-
Size
1.4MB
-
MD5
d238ae7703ab2718b189586a0e5c6bd5
-
SHA1
4a9c59150e4682c5749902a1c90da24274a5e369
-
SHA256
f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da
-
SHA512
8c6a490ea6cbc93f45bb4d45d02da4152d50aa6af52e3c3bccc51058389f16ea083004c7cce6203ebd59c3c738343763707cb23a9417e3f28b0149169e088b1a
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
4csZUe6KNk9.cmddescription pid process target process PID 3032 created 648 3032 4csZUe6KNk9.cmd lsass.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe4csZUe6KNk9.cmddescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\\AC\\INetCache\\nKoltJHn0bqY4PJWDxeiLzNGU5WM1RqOI5vwhMO1RnzBoybddyX3kMBWA2yCv.exe\" O" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\ga-IE\\1RiE21COq6610dSlDKUsMIH3p.exe\" O" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 4csZUe6KNk9.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\AC\\INetCache\\T2EX7C1H\\aVe6OVvAkJHZcGG6RZe3f.exe\" O" 4csZUe6KNk9.cmd Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\\GfrwRCJJ24wEY5aNFpMpOB.exe\" O" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe -
Executes dropped EXE 2 IoCs
Processes:
4csZUe6KNk9.cmd4csZUe6KNk9.cmdpid process 3032 4csZUe6KNk9.cmd 4376 4csZUe6KNk9.cmd -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
4csZUe6KNk9.cmd4csZUe6KNk9.cmddescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe 4csZUe6KNk9.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " 4csZUe6KNk9.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe 4csZUe6KNk9.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " 4csZUe6KNk9.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe 4csZUe6KNk9.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " 4csZUe6KNk9.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe 4csZUe6KNk9.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " 4csZUe6KNk9.cmd -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
4csZUe6KNk9.cmdf7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exeLogonUI.exegpscript.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\52\\R0sthoHEvTAbs4CrPwk2wSHuikq8.exe\" O 2>NUL" 4csZUe6KNk9.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 4csZUe6KNk9.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Windows.CBSPreview_cw5n1h2txyewy\\AC\\rS0cgoJFidhzWpq46qanoEkhd21m1rHtvEbod9MCkhQWaB6VrTShXhzVW.exe\" O 2>NUL" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\DldI5iQZsXTEeQ3tQdyiwp7lOBIq1qmUCW7kHnrI9x2OwglimcX.exe\" O 2>NUL" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.LockApp_cw5n1h2txyewy\\RoamingState\\m5fKUbruQ1bzdzH3eUo8Cujwazl16lP7KddJ.exe\" O" 4csZUe6KNk9.cmd Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309dab0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Key created \REGISTRY\USER\S-1-5-20 f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\adm\\it\\cLUKQtmgFxPsX4Z6j4eMXWNeu05wMqNMGpIFOMVap.exe\" O 2>NUL" 4csZUe6KNk9.cmd Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\en-GB\\Gq5RO0Saa5Lowpk3x2uobcsZ9FicIjbgjmERQMj9FpYI9ev3DJiIl2Ocxza1UAIodHGErp.exe\" O 2>NUL" 4csZUe6KNk9.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 4csZUe6KNk9.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\E2A4F912-2574-4A75-9BB0-0D023378592B_cw5n1h2txyewy\\SystemAppData\\wy2IHa1cMqXd.exe\" O" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\qml\\QtQuick\\Controls\\Styles\\93NRPzTAnvHWCubJjm.exe\" O 2>NUL" 4csZUe6KNk9.cmd Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\AC\\Microsoft\\jIjmIN0t2xb5.exe\" O 2>NUL" 4csZUe6KNk9.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Sync Data\\LevelDB\\ZxfziRNj1TItTFgGVDXfgXI1iCWToT.exe\" O" 4csZUe6KNk9.cmd Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 4csZUe6KNk9.cmd Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.LockApp_cw5n1h2txyewy\\AppData\\QVlHTCkUstFKCpZg7NifK9.exe\" O" 4csZUe6KNk9.cmd Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\35\\EnyFyfJ9XYm7KxzP08w6deH.exe\" O 2>NUL" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\\AppData\\KiJfpWbVUez.exe\" O" 4csZUe6KNk9.cmd Key created \REGISTRY\USER\.DEFAULT f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "169" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 4csZUe6KNk9.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.VCLibs.140.00_8wekyb3d8bbwe\\AC\\nr84oqHIyNdIsyuryIODdZitj8n84sGHlII.exe\" O" 4csZUe6KNk9.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\LocalState\\ConstraintIndex\\Apps_{fc2412e7-0d03-4bbc-8ebd-8a781652b8a7}\\2RqV9VWxnwO5rgvm9Oy6UtDQnCgnZ7V7HmcZQkPul7bQKesFbcAUBNM4bd3Zkp4.exe\" O" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 4csZUe6KNk9.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\GCM Store\\Encryption\\rpGStSSXe1LanHzIgtje2YloNwGlAlgrg5Ikhxkg4jbt5eyp9VJ8JRPsc.exe\" O 2>NUL" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\\AC\\QSbT7CRGmXylnGMApvQ.exe\" O" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-19 f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Modifies registry class 10 IoCs
Processes:
f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\UEV\\Templates\\kR069WChJPqiX5YHn9ecRIqQxEPk.exe\" O 2>NUL" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Command Processor f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.LockApp_cw5n1h2txyewy\\AC\\INetCache\\PMguhKjbjBYU3ea.exe\" O" f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4csZUe6KNk9.cmdpid process 4376 4csZUe6KNk9.cmd 4376 4csZUe6KNk9.cmd -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe4csZUe6KNk9.cmd4csZUe6KNk9.cmddescription pid process Token: SeBackupPrivilege 2476 f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Token: SeRestorePrivilege 2476 f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Token: SeShutdownPrivilege 2476 f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe Token: SeDebugPrivilege 3032 4csZUe6KNk9.cmd Token: SeRestorePrivilege 3032 4csZUe6KNk9.cmd Token: SeDebugPrivilege 4376 4csZUe6KNk9.cmd Token: SeRestorePrivilege 4376 4csZUe6KNk9.cmd -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 1668 LogonUI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
gpscript.exe4csZUe6KNk9.cmddescription pid process target process PID 4548 wrote to memory of 3032 4548 gpscript.exe 4csZUe6KNk9.cmd PID 4548 wrote to memory of 3032 4548 gpscript.exe 4csZUe6KNk9.cmd PID 3032 wrote to memory of 4376 3032 4csZUe6KNk9.cmd 4csZUe6KNk9.cmd PID 3032 wrote to memory of 4376 3032 4csZUe6KNk9.cmd 4csZUe6KNk9.cmd
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:648
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\Reader\DesktopNotification\4csZUe6KNk9.cmd"C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\Reader\DesktopNotification\4csZUe6KNk9.cmd" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
C:\Users\Admin\AppData\Local\Temp\f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe"C:\Users\Admin\AppData\Local\Temp\f7a2b7438b30169234c8c6500c9c5b8a15e40f5f929aae48e69961dd9d8918da.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39eb855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1668
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\Reader\DesktopNotification\4csZUe6KNk9.cmd"C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\Reader\DesktopNotification\4csZUe6KNk9.cmd" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Diagnosis\TenantStorage\P-ARIA\JRj5ZnUlAI2DRkKO9RxGxmtmKlQvu4NOpi1j4F0xr5WeUQJ.exeFilesize
1.6MB
MD5da4000146de00ca7a7acc0de46708fba
SHA15124c5e35b20051e2b99f2bcfa756bd868ce49ba
SHA2565b5b418ab69c5b3bacd68fdb732bbd962e5887a03c818ae174cfa9307068bd9e
SHA5123bc9d45300fc2fb349706b2531a2a4e86972aff468c1ae37a111a258895a16f3c16bf0c109e17c3f09663e355a625f252353a16b98d3b24d46fa4de560a06ce2
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Config\mDocuYhDU58MAWqbnY6qM5PAzhrUH0JQyqJWN34oYDe2NVdugRXJ8MhXKPZlhCjO45.batFilesize
3.9MB
MD5888d8f3ef0d52cfce633e4691576cd40
SHA1860f74433672bf2ec220c18f90bae3dedde67db9
SHA25641ae1aa80cfc18eb1e0fb5a3386602dd2e45128e044d0bb93dbbefaedeb6ac05
SHA512c7ef1a7d1f3eb2b9b714dc83c7631f8ae3d49fea9f4b4e0056d705bb8b2c49e5a93ce8652574b8a61c76b1457669b50bef6074fe70dc06b7e4e3d65f94a0a3e1
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\Reader\DesktopNotification\4csZUe6KNk9.cmdFilesize
2.0MB
MD5eb4dbb7fadd0905309bc3b71a4699c1b
SHA14fd5ce8d1c5ea51b8a7dec27bbfd929b1030769f
SHA256f7f52d3744d0e7facd0fda45593ee9fbfc3a6dd950fe9407c12f3bdaa340ac41
SHA51201df4a3138fc29f9047aee2c25e6f00308dc3c5265431cd408109b266cd58a07cdf34ce43ac2d0f4b9701f375619612dc8346b359510330732eb73fc30f549d8
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\Reader\DesktopNotification\4csZUe6KNk9.cmdFilesize
2.0MB
MD5eb4dbb7fadd0905309bc3b71a4699c1b
SHA14fd5ce8d1c5ea51b8a7dec27bbfd929b1030769f
SHA256f7f52d3744d0e7facd0fda45593ee9fbfc3a6dd950fe9407c12f3bdaa340ac41
SHA51201df4a3138fc29f9047aee2c25e6f00308dc3c5265431cd408109b266cd58a07cdf34ce43ac2d0f4b9701f375619612dc8346b359510330732eb73fc30f549d8
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\Reader\DesktopNotification\4csZUe6KNk9.cmdFilesize
2.0MB
MD5eb4dbb7fadd0905309bc3b71a4699c1b
SHA14fd5ce8d1c5ea51b8a7dec27bbfd929b1030769f
SHA256f7f52d3744d0e7facd0fda45593ee9fbfc3a6dd950fe9407c12f3bdaa340ac41
SHA51201df4a3138fc29f9047aee2c25e6f00308dc3c5265431cd408109b266cd58a07cdf34ce43ac2d0f4b9701f375619612dc8346b359510330732eb73fc30f549d8
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\EnyFyfJ9XYm7KxzP08w6deH.exeFilesize
1.5MB
MD54c108d57d1182b2caf19393be2a1fe54
SHA1240a2e42e8d10bfd9db5e9d707a2b139f12b53b8
SHA256d6382351fe9a3757fb20b6e30ae21f412638ad5617fed3768184439c7ca58d71
SHA512632b86e82464a1691a4dc465e2d567c7eca6118db09e6f4fdbee8ce02a75f108c479652295a3d7898c1ca45723336fe5d85ca97f9716ba0df359cc4d47906aac
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\rpGStSSXe1LanHzIgtje2YloNwGlAlgrg5Ikhxkg4jbt5eyp9VJ8JRPsc.exeFilesize
1.4MB
MD5adb9c4dd57ca08a2d856766140c2a909
SHA1814e514dd5bd0ec8c6aa5822327ee1f5feee13d3
SHA25698a2d818bae6d361d6fbe0feeea97ae63378e037584380184dcfd7d9443bbfe0
SHA512b8be9a1a4e03ae7156b631b46b85a46f6bb7a996189f50d0815bd5d39d0d4fc631768f727093424c4fb86cd61f3d2d1cb248ac59efece3ec331f851acfcd1ae2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\DldI5iQZsXTEeQ3tQdyiwp7lOBIq1qmUCW7kHnrI9x2OwglimcX.exeFilesize
2.1MB
MD5368ca8ff414257e005ce837c41213698
SHA1c33615366cf46b236b26e401953ba0bb07e7dc18
SHA25694020fcbffb5247205d2876551e928507c12bcac11d05b101b40f21288cb80b6
SHA512ed98c4d1b3720a6d8225b7d0ce1ed373aab961817d100f908716c825689a82aa099dc9b0eebac75f76427f4aeae7c20b0606a64d2cd0acb386ec5f474884a932
-
C:\Users\Admin\AppData\Local\Microsoft\input\en-GB\LjwrBLa7xIOs4aS7BAmyhfejQ8MGRYWBvSesEWBOLhJeilYp5tMkz1SvcPS2WyAYGFyfI2L.cmdFilesize
3.3MB
MD58209d44b2c5906dd1a9bac19f3c22f97
SHA133580b2306acc9f03687c138b0f974dc852b8c90
SHA25667a66bb1b9fedd54b0080e48cd205bec9430c9544faec50873021e08ce2d7d6a
SHA512b02c472a70350423d3ec23c59d22b59f315ccb17a0c8845380df8505dc12d387258e2c48590980520fbac89ee2ac3f2f47a201fb080ebe4c997a71aab67f9f48
-
C:\Users\Admin\AppData\Local\Packages\E2A4F912-2574-4A75-9BB0-0D023378592B_cw5n1h2txyewy\SystemAppData\wy2IHa1cMqXd.exeFilesize
1.7MB
MD5f4e79009c141aade40cdeaff178eab3a
SHA18dbf844e615a72d708c4754dd156f8a1d8506373
SHA256be5f3de09c419e39b70640844feb062eb41b054fe5f5f203a8f7f8882f0a5864
SHA5121ec4db2ea88e6b02161800ef84f9469ca91884861e5ba3533d739519a37e81b02c0f7a4f2f538c2a0c218f8e621beafb33122bd2d000a5c1813942c598f458ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Apprep.ChxApp_cw5n1h2txyewy\LocalCache\aiQswX3SbXNIPjcZwwhlowiIOCdwL.exeFilesize
1.7MB
MD52e63a1fd2173cc878c02ddc8867ee99a
SHA10bd1c1dc41708e79c22ffb43f586378aa99af1d1
SHA256fdd61e242988a8e5c99cdc226faaf3cbdfd2787cbb52be5fb8e28e8ce2302c95
SHA512d0ac914114c637516615c0ed62519641d3e6f76785a5fb6a23d9c3e3b4edde20024335579c3e4963ffcf740f4d2f65dca6ef8be1190abd56ac1f5c72495946e1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\AC\INetCache\nKoltJHn0bqY4PJWDxeiLzNGU5WM1RqOI5vwhMO1RnzBoybddyX3kMBWA2yCv.exeFilesize
2.4MB
MD54f3640b06e2ecf54633ceddd0b2b9b8c
SHA1f9c134c1c1a9d0fa1bb2d07b4724309a5bb40295
SHA256bdb4b9780c2d3895990aa640c46ed53f9516f337288125e831d1d9042859ec25
SHA51214e0705afa852685225465d895016d7273ab3aee49066e4c40a3cb8fde1e49ce6782f0e3de0536cbcd1576419e20da15be6d489f07daa7a16d3849b71028dd0c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{fc2412e7-0d03-4bbc-8ebd-8a781652b8a7}\2RqV9VWxnwO5rgvm9Oy6UtDQnCgnZ7V7HmcZQkPul7bQKesFbcAUBNM4bd3Zkp4.exeFilesize
1.8MB
MD5ce7f5df6baec89d9fdf5ea65c9b3321f
SHA1b69dec04ca0c065fde7c74b14d86651c5080a277
SHA2569d52b73401fd10422bb5ae1f9922c01494f82c7ef3d7fc74d88ea691f7b3706a
SHA5128d0d134e18cf0459fbe13eb94c52fcd642253c8fa6983898c5ad3a1d916452a89e383f15e783197eabca907e9056a5c213f57bca0ef956bf7516909db93b791d
-
memory/2476-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2476-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3032-137-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3032-149-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3032-146-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3032-134-0x0000000000000000-mapping.dmp
-
memory/4376-147-0x0000000000000000-mapping.dmp
-
memory/4376-152-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB