Analysis
-
max time kernel
201s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:43
Static task
static1
Behavioral task
behavioral1
Sample
fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe
Resource
win10v2004-20221111-en
General
-
Target
fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe
-
Size
518KB
-
MD5
25e285099137741bcf79b1f1d856642d
-
SHA1
93b9532d874aeca9211066c6cc726d062eb092b3
-
SHA256
fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6
-
SHA512
14d1a10fa565c94964213fe908b256e385ac8b9ba8f18e8b150338e1fccffe21b640f30a7f9189c72d070b6c8fb84dbfe767dab834b20b533ea51baa0cecb584
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exesQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.batdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\2rnZP4wEHNSz4PzgPCissLXtFCswKf8WD7ItW74e0mEHK3zCJFNBInZmKiURy6H.exe\" O" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\46\\VsUfhedaWqnZwdVv4q37iWono4uhH8RwuDlGsQWy3SDl.exe\" O" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\sk-SK\\LqqWaDeZS0RAZY2D30aAlIMQutC47NWyab2YLtGJhWpdkQPuVcLn7SQr38CdAV.exe\" O" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\log\\Z28LBPspm2pF5bGMd8CRZuzlVw3miE.exe\" O" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat -
Executes dropped EXE 1 IoCs
Processes:
sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.batpid process 4080 sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.batdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exeLogonUI.exesQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.batgpscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\11\\hu87VpEzYXlP4OjWxSQvQDi.exe\" O 2>NUL" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-19 fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "240" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{4234D49B-0245-4DF3-B780-3893943456E1} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 01000000000000000b357a0ce600d901 sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\ClipSVC\\Install\\eOAZhHSuXG0vwEDLsFSvn5QepYx6Cr2m8rrcj08HxSwjVNJur.exe\" O" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\LocalState\\ConstraintIndex\\Input_{ab795a40-059e-4552-b627-00ce5c0e98ee}\\EWXi8eY96XTPQsi88SWk8Woq9Ygkc5zT96B0JR.exe\" O" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\gu\\YC478YufrPI3W59OEdTWrbBcHSNzgfYGjPi8l7yDJh4K8fIaD.exe\" O 2>NUL" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\\AC\\Temp\\u46eOkbvPQAEFsmKYLamQ7veftQf0OiZnlqK29d8MrsulXtaIExysAUK.exe\" O 2>NUL" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\sr-Cyrl-RS\\UjfYvlvBwnvy0tWjTm.exe\" O" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\ha-Latn-NG\\obONvAZ3dUPdGeF5bK6esiu7YyeuxVf.exe\" O" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\en-IE\\IWghbzPg5HkNzPkL79QAGFrOjpTojqIE9NAAepm8MYY5SM6GAuBEp09IkKTWK5y.exe\" O 2>NUL" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Mozilla\\Firefox\\Profiles\\yrilf55p.default-release\\cache2\\doomed\\FeZxTL8wuJz161VOEVtExwVnImTVyl4mh7xaqe3RgmGf.exe\" O" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\USER\.DEFAULT fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-20 fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\WER\\Temp\\PppF6c3M04rS6B7BaaXA80jJisjwSnRM4tqTO6aqwZ.exe\" O" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\\LocalCache\\ctBDmPfdABFWDhZ.exe\" O 2>NUL" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\\AC\\INetHistory\\FXoB6LDJYl8LFuo86VhG4EN9Knr6nB.exe\" O 2>NUL" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\\AC\\INetHistory\\zFrLBYSI0jdRr7hRL3bfpZ.exe\" O 2>NUL" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Java Development Kit\\OuKA1qbFzF8nFKYVG837L6UOCl4vKlE6CfELH66PRnYVWMgFaRu4nGGhtIicmNJ.exe\" O" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\ml-IN\\NEpW063YEDKCNAsjvX4jfTpzpNjHyPr754inoQ0CUgf0knDziLcc9wJvkqWb.exe\" O 2>NUL" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\FileTypePolicies\\unkuxFcjQAnoiBaXZezF.exe\" O" sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Modifies registry class 10 IoCs
Processes:
fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Command Processor fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Burn\\E0vVp9aUpUGisnC592XnZGsFYaDmQk3JPCzUo00hjriNq8sAOBxXIjtGFo1YiTK8o.exe\" O 2>NUL" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Windows.CBSPreview_cw5n1h2txyewy\\AppData\\xMvOHjXBvVuz7ic0uw0rzS0lwjfyvlGTJWGod63r4vNo4kZ27AGq1FvmV0PPRMWDTxOQ.exe\" O" fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exesQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.batdescription pid process Token: SeBackupPrivilege 2952 fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Token: SeRestorePrivilege 2952 fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Token: SeShutdownPrivilege 2952 fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe Token: SeDebugPrivilege 4080 sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat Token: SeRestorePrivilege 4080 sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 460 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
gpscript.exedescription pid process target process PID 3764 wrote to memory of 4080 3764 gpscript.exe sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat PID 3764 wrote to memory of 4080 3764 gpscript.exe sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe"C:\Users\Admin\AppData\Local\Temp\fa9a440db8225b8f996f478afeb0b7ac395f88ff13543511254e4af8051d0fc6.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39aa055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:460
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\gd\sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\gd\sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.bat" 12⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\ClipSVC\Install\eOAZhHSuXG0vwEDLsFSvn5QepYx6Cr2m8rrcj08HxSwjVNJur.exeFilesize
702KB
MD508719e5ce80d22f57bbcc2ae591212fb
SHA1dfca090b25407a2f8ab9c9e7e02bef8ad41a5801
SHA256fcd83391f4fe5e5096bafd1a1850380c60be08357eba332f061ff3673ee10b58
SHA51234ff79b82674cd412e5b1fbf01bc0f987b237f8e0c59bef458e8d60f67bee936cd02e7e03be3f856bffc4cf86598d6c95306a16290a58746287e17710153936b
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java Development Kit\OuKA1qbFzF8nFKYVG837L6UOCl4vKlE6CfELH66PRnYVWMgFaRu4nGGhtIicmNJ.exeFilesize
740KB
MD5a6ee7d697a37aecc4bbd85810efce0e0
SHA123bd18a79f91ed7e58c032d39be75b12e478a2df
SHA256531afd9d6429fe407a6f0835c537658230d8dad39a8299576352e7f05fec9948
SHA512d1381481296f2a89fb1aec77a9326835e716342d0fd5035f90ab9dd6a0a54a650524715a0f9cd6982afdc90474af5782c074ded1de9c6fb59f36b53d4acb7c8c
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\VsUfhedaWqnZwdVv4q37iWono4uhH8RwuDlGsQWy3SDl.exeFilesize
1023KB
MD5de60e8cbb59a4f426e1eec3d897ca1c8
SHA1b0ecc8b9e7d12fb2a1e08927bcb26202f9226a69
SHA2564b855a9338d758076cc142422dc3f6aef1f1a351cf22765550e14fbba0912efe
SHA5129cb0e7de6058d45f29c100fc4a53efa78ab4ba53ca23457a0baae34fbf51b5e304ba3b48d4bfa2e78652ac55e6af97ad9ece54523611799cbb28e046552bcfb2
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\gd\sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.batFilesize
752KB
MD5e649003d57ac8196612b23235b6a70f0
SHA1086da99053824f88941dd969abc74167110115ff
SHA256aaa3656937985784f754240ca75ef0e50b8b408e06efbfd37fce9b75de68dab2
SHA5124a2898cf3506781a9ca63f8cbd1e9f3417f0001bfe8d3ebeed9e1971d4639e83734261665a9dd8fb2ec3a800f1df9c7c306a9dffaef4d0d7d3e7c61af32cd6ea
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\gd\sQJ9PIePSGW64UNZySALAKeL0JR8PobGpj386gqim4SSq.batFilesize
752KB
MD5e649003d57ac8196612b23235b6a70f0
SHA1086da99053824f88941dd969abc74167110115ff
SHA256aaa3656937985784f754240ca75ef0e50b8b408e06efbfd37fce9b75de68dab2
SHA5124a2898cf3506781a9ca63f8cbd1e9f3417f0001bfe8d3ebeed9e1971d4639e83734261665a9dd8fb2ec3a800f1df9c7c306a9dffaef4d0d7d3e7c61af32cd6ea
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\gu\YC478YufrPI3W59OEdTWrbBcHSNzgfYGjPi8l7yDJh4K8fIaD.exeFilesize
864KB
MD5cbd018c85a2fc45deac3b9a019b1f461
SHA109db0b50257cb365c11643d2ddbdbf1c27bfb2a1
SHA256fd3d247b7ef332ddc0c4758bb7a65303c9f26ea579f918896921944240160196
SHA51261d973cb1f4ed4a4ebd9a32e7aa13c6c1052b99f3be36302483c1880370b89ec81ed4bfde267dada04a1e90fd6a0dabb7e6430e888c96eb313aeb6b3791c2f66
-
C:\Users\Admin\AppData\Local\Microsoft\input\en-ZW\2tXDqmy0O1PownJ9uepmE3M9V7mrKbtwo1MsP.exeFilesize
877KB
MD59d6408cdb1af9a52feed31d99bc682c2
SHA141610ca889dd2bdd3dd3480130a51ea6a6b154f1
SHA256f406b83adc0adb73260c6e73b70b8f6fb5e9e5fe9761dd86d4f0a3ebc860740f
SHA51238d3ea1d353255a4d60fb1e2efccc62d6b87f45406ae79b00849152069630525c3ec3ad42edc3df724c5a4874bbd2f467adf56e9a4363edb127247c9e4b1b26d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\AC\INetCache\OcLiOgSmtcpr2fImxO6TMpOtw5tPHWarxyXugu.exeFilesize
840KB
MD509e07d04d0aa710bf15c856b55687a61
SHA16734a1c4b3ddfb1573728e420f2bff28b3fc43ee
SHA2560b357533ed5f6ef90376f3f2712e91aa0d4148649a37a00a96238fcdd28e6df4
SHA512532d19a102fef6adf8018c285d33f69fc1fa681a873943eb2ef5d7c161db40dc612e027f12a98966db6b2f52d1af4fef9e0e08d04d44914e503894144b0d2267
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{ab795a40-059e-4552-b627-00ce5c0e98ee}\EWXi8eY96XTPQsi88SWk8Woq9Ygkc5zT96B0JR.exeFilesize
762KB
MD50dfaca83236e94f763c89908ea986f52
SHA121b149566c03d23e48a4725fa5bf75572edc6d98
SHA256144ede584dd7631a17251be728ab4e020632571c13ac261f0c3287462fc9748f
SHA51215874ab254eb8ba5326d9f5045e88bcde3dda45bba7fa422d8ed2da2e127034a9652916c7e3dd200c673a8e8dc53ac0a09450a0b1c2fe10e7483f8fa6b24302c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\AC\INetHistory\zFrLBYSI0jdRr7hRL3bfpZ.exeFilesize
737KB
MD50edc297a7a90f89286871592f30967e7
SHA1c0b4b06e380f65cb4cf77bc7212ecfa27a40a590
SHA2564aa7c3864c5a7219d15b49f950624635d000a4ac521aadd33114a656047c165e
SHA512b6cbd1ed9a4f9903b134e272eb5b3908c41dc547b672b2d1845d282b52e414f318c2c8f1b4d5bf50f2144ae763126144552500dcebd13e873aeb8ea867795d28
-
memory/2952-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2952-134-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2952-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4080-138-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4080-135-0x0000000000000000-mapping.dmp
-
memory/4080-147-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB