Analysis
-
max time kernel
188s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:46
Static task
static1
Behavioral task
behavioral1
Sample
1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe
Resource
win10v2004-20221111-en
General
-
Target
1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe
-
Size
561KB
-
MD5
d6f88a3ae30bf65a923656080b293f32
-
SHA1
0ed5fec8b2b9aa2f372043f1f0f8a079c6098166
-
SHA256
1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b
-
SHA512
3a5d29eac681f6a289940f66e7e1236dffe119d59cae3435fe7063cf52b2297804ea394eea5318bde4871fe0a0d8af63599e8af7080b6b266fcfb25eb3e26bb0
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exexJWAbKbadLbZ0V3U0qBkaULdN7p.cmddescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.LockApp_cw5n1h2txyewy\\SystemAppData\\rC1hh8UOZ9cD3vmzVGTPszOQStsS25nq6wjasTkWwlV.exe\" O" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\AC\\TokenBroker\\Cache\\oJGtlPtVnH2kbUK.exe\" O" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\\Iw8tOjzZXeoswsR03pbnAXO23pR3FMZdwG8BjxzUv1da4CcnGU5LJ2S.exe\" O" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Internet Explorer\\Quick Launch\\User Pinned\\6JAEy9CLwzZos0.exe\" O" xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe -
Executes dropped EXE 1 IoCs
Processes:
xJWAbKbadLbZ0V3U0qBkaULdN7p.cmdpid process 2504 xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
xJWAbKbadLbZ0V3U0qBkaULdN7p.cmddescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
Processes:
LogonUI.exedescription ioc process File created C:\Windows\rescache\_merged\2229298842\2108449796.pri LogonUI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exeLogonUI.exexJWAbKbadLbZ0V3U0qBkaULdN7p.cmdgpscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\\AC\\Temp\\N2u8pB5GmkxGxGVnzc9lAf7IyvXIKCE6UpfHegtX4HppjZW3z4hxczl5Lp.exe\" O" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Packages\\Microsoft.SkypeApp_kzf8qxf38zg5c\\RPYTAn8omJc18NbU88F1fr1BnQ51gYIHAm0L0FEiFNpySt.exe\" O" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\\AC\\RobAc9XNlQvxxw3S7ZOFK2LR6oIJxu.exe\" O 2>NUL" xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{35786D3C-B075-49B9-88DD-029876E11C01} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF = 010000000000000086d95778e500d901 xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\.DEFAULT 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\90MK9CXD\\icx3kFI4qTJJc0EEykiUu0DkD3C2KsY0hillr7q7iebsHjwvYryVTX9qL5D1WQ.exe\" O" xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\\LocalState\\iqquDCwb2N61cMMJPlQ1tCt5WOwkagYw.exe\" O" xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\quz-PE\\ttaAvCCgg.exe\" O 2>NUL" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.BioEnrollment_cw5n1h2txyewy\\xQ43GKDKULwf4sRWVibRfAR2lphezvc8hf8sb5PLz36IEtJuMFyL.exe\" O" xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{289AF617-1CC3-42A6-926C-E6A863F0E3BA} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF = 010000000000000080735578e500d901 xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\NcsiUwpApp_8wekyb3d8bbwe\\eCe21pHhP44Kkxr2FpC3A.exe\" O 2>NUL" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{4234D49B-0245-4DF3-B780-3893943456E1} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 010000000000000046c15674e500d901 xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{FF393560-C2A7-11CF-BFF4-444553540000} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000d3644278e500d901 xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\NcsiUwpApp_8wekyb3d8bbwe\\TempState\\iwVBo2On.exe\" O" xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\SettingSync\\MyWmgvVE26IRfHd0pRYPyzgNTbMmUSXnnHwubwx5PLWYEL.exe\" O 2>NUL" xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Provisioning\\privfcrgVcq.exe\" O 2>NUL" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Default\\hhJiBvxBF2jF3VrUmCHWVCZUlW2gkP6hbJvjq.exe\" O 2>NUL" xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-19 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.AccountsControl_cw5n1h2txyewy\\AC\\INetCache\\TRxDqlUN73mofErm79EPIn8xYq4J.exe\" O" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-20 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe -
Modifies registry class 10 IoCs
Processes:
1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Provisioning\\z8k2Lf4T7hIuqBD1VZWL2mMQLsgK.exe\" O 2>NUL" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Command Processor 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\tn-ZA\\y5iroOfFsjsq8uHMzAn8eHc2ghKWAnMZVVwwIwr6ZRMPjWRutGpjOuXpW.exe\" O" 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exexJWAbKbadLbZ0V3U0qBkaULdN7p.cmddescription pid process Token: SeBackupPrivilege 2968 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Token: SeRestorePrivilege 2968 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Token: SeShutdownPrivilege 2968 1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe Token: SeDebugPrivilege 2504 xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd Token: SeRestorePrivilege 2504 xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
LogonUI.exepid process 5036 LogonUI.exe 5036 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
gpscript.exedescription pid process target process PID 2460 wrote to memory of 2504 2460 gpscript.exe xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd PID 2460 wrote to memory of 2504 2460 gpscript.exe xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe"C:\Users\Admin\AppData\Local\Temp\1f322bbac8688707fe451ec0053cfeabd36e2e5270332fe8b506e22d5cf3d33b.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39d6055 /state1:0x41c64e6d1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5036
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\LocalCache\xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd"C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\LocalCache\xJWAbKbadLbZ0V3U0qBkaULdN7p.cmd" 12⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Provisioning\privfcrgVcq.exeFilesize
977KB
MD531ef8c574c9527adb6a88c7e480cd13f
SHA13e29d197ae85632b69ed20f989bd83830aac5199
SHA256b4a71df8643883afacbcd2f776b2b432c515da033137f3c4deaa9c63e74b28d7
SHA5122fa710396236fcf58b7f810a4c654c94689664388bc8fcc32d2309df6c25218ecf873cdd6b4d926ba3e8239976fcabd16ffc355f3b999887885b44cad6a94b63
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\OotYluvWyJ2eFY.exeFilesize
972KB
MD58b9c5608f7eb34c3e09729650da2855d
SHA104c4a548127a0d9be012782f4f959b73c5654cb5
SHA2569c2f42edf0d7e9ba0121cf85776b495e6375bd623c3363067d2b17b63d65c4eb
SHA512aed608f515680b1386fb0db0ac60b7d454044a1335989f40b3491f073dd4ea38d9bae97eb05c033fce318586a42ea1747bc802fb41e5604313f48699ceda1d5d
-
C:\ProgramData\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\RPYTAn8omJc18NbU88F1fr1BnQ51gYIHAm0L0FEiFNpySt.exeFilesize
1.0MB
MD52be472515a8c125a12a66c9346580490
SHA19a9c54247bfab9aab1a07161b013d53699579cbd
SHA256fb95cec29bccbabf82889c53ffb3fce865d38e1eac474411aab25ce96bf93e9d
SHA512f597bc4283fb23532b3ee63349ea8f499cf467e8091d0e6153804334cd91ab5e9cab5aaf0ace3c2c2f5b7661088079d0a6827fe593861920bc3ff1da6d6913cc
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\quz-PE\ttaAvCCgg.exeFilesize
763KB
MD5fc4cdcbc6c955afcaeb1d96dca5d0707
SHA129583c2247990257d0f558a579542477f9c998b9
SHA256e9277f79456af7b7f93d356cc9fecec2f452ba6ba5dc0d6aef0ca8173428c81b
SHA512dd28eeba87cc59351474ef9d4d693e3dafb5b4204b4aed93b3282cc8525d9a596f577fe7ade3eab0eefe5e7ec0e515ada73380f4615a2aad0f153dc84761fec6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.AccountsControl_cw5n1h2txyewy\AC\INetCache\TRxDqlUN73mofErm79EPIn8xYq4J.exeFilesize
899KB
MD5b00ae045b511e2eb7eed04a2bb04f790
SHA1f96ec36596a61d361afe04f45249d3b6d007f588
SHA256a95bde66ce83739c13a909f2ccf2a34aeec56af4483348ddc06483fd5cb8efa0
SHA512ff2e0563ac2cfa6a937d7d60a6f415887cd1df8af444e70fdb16cd33d63cd9ed07a22ea8481e1921fab41c4cd621633b227a1ae248e53c49ab596dfc7f487d1e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\TempState\d1TNmBTfx.exeFilesize
996KB
MD5e5e10f8fb4e845d3171ce4adefc838ce
SHA145b7f858b22e27b48f8b9035f49b8bd044f848aa
SHA256283e10682fb399745574157e464c15c8e846f4105af84fb976c4539d0221f2e6
SHA5120a96dd42059ce16f015e5c8128078a0a473b58dc54c1a4ccfc1267ca073d37a0d159884dfdb44370485bf5285c97c85118e3e3b8218d3b2d5eda6ea612576ff2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CapturePicker_cw5n1h2txyewy\AppData\Sgdv7cOh4ciryVqY.exeFilesize
1.1MB
MD51362b48b3b56fb045cd5a4f9cdb6ba74
SHA1c38ef0675e9f62fad118aeed7305a0c066e8bb46
SHA25646b1e906f27742c58ecf39746806a9f8b1ff1f4650900ea1e378afe36fa97131
SHA512b2616493a0fb9a99c1ca71ee8a2e4e2fffcb06c64de8aefe36b056b07f29df17f6f2a021e22f90a375e0684b121010d12c4eb3cf11308840586e1cb18683c298
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\LocalCache\xJWAbKbadLbZ0V3U0qBkaULdN7p.cmdFilesize
752KB
MD5e4eb17f3c23a216723f4be6ef68127e8
SHA1158c407f6334d922c9848ca9d7806790fd1708e8
SHA25664a99d8aada0fbbe5d6165dbe3bd53ee68bfcaa87378650858ee9689dc41f70f
SHA512920215ddb4821e6a70bf37ee0924af51b6d1020cc7321eb11f25f1cba22c86f25ca8a1932bf5089d791551c9d4a9696532b356ec49a5978fd42b962b396e7a0b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\LocalCache\xJWAbKbadLbZ0V3U0qBkaULdN7p.cmdFilesize
752KB
MD5e4eb17f3c23a216723f4be6ef68127e8
SHA1158c407f6334d922c9848ca9d7806790fd1708e8
SHA25664a99d8aada0fbbe5d6165dbe3bd53ee68bfcaa87378650858ee9689dc41f70f
SHA512920215ddb4821e6a70bf37ee0924af51b6d1020cc7321eb11f25f1cba22c86f25ca8a1932bf5089d791551c9d4a9696532b356ec49a5978fd42b962b396e7a0b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\oJGtlPtVnH2kbUK.exeFilesize
698KB
MD58a834e239882c6dc881dac808c2e6848
SHA16fcc978decc1da2d95435a9387811525e3a9b95d
SHA256dbc13b115378f5c795b9e1177f24dfdb1f303a1ba312b535ad2d6fc90e403387
SHA5122ffbb2499ca0122de478a6b57c87f72441149ae286e58ae38b2767e1c608dc93e03bd2f27aace5b3afffa81f86d2e2fa277e161c5e28267467c4f70537759083
-
memory/2504-139-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2504-138-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2504-135-0x0000000000000000-mapping.dmp
-
memory/2968-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2968-134-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2968-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB