Analysis
-
max time kernel
153s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 08:50
Static task
static1
Behavioral task
behavioral1
Sample
808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe
Resource
win10v2004-20220812-en
General
-
Target
808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe
-
Size
2.1MB
-
MD5
b322484e73005048a50faa38667754b7
-
SHA1
b177d083b24fda398aa1f496ee69bafa7525a3a3
-
SHA256
808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da
-
SHA512
a7c46b90ce90103a88677f4613afaa30c7e38b4bdbc067b38f747a1b5c550a23b7678bda977282f07aa7be3f55f76f61c0a42de0081ad4694e8cd6a06e711b24
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exelEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\AppData\\Roaming\\8qkyx31P0MCpDrNJPzHNyfwBtQkGCD.exe\" O" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Feeds Cache\\YB33FE3E\\bwF0FLspqIxC4bSo72ykPEcjnUdnJBs6L7kY8gB6tpg9NgudPFx1DZ31l.exe\" O" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Internet Explorer\\Recovery\\High\\EWZrKY2TMDZRJSmuUeabU4.exe\" O" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Adobe\\Color\\JRR06zCnIm7JcmkS2GmtusxG52H5Io8L.exe\" O" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe -
Executes dropped EXE 1 IoCs
Processes:
lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exepid process 2028 lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe -
Loads dropped DLL 2 IoCs
Processes:
gpscript.exepid process 968 gpscript.exe 968 gpscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 55 IoCs
Processes:
lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exegpscript.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\676RWI6ZnCqATlQyX0WqXFdJUwcqC0jlVNPyPesRQJWnC.exe\" O" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\eiRjblYBFqyPc6b8ZYAW91XdOh9rzRELqsKrOHOwHyujMmGF9WR.exe\" O" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\ae6vytmk.default-release\\security_state\\aalKNm7Uh86RL2g3ZilGEgq47xlOAHEE1N.exe\" O 2>NUL" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Code Cache\\wasm\\index-dir\\Q6tIpRCIR5.exe\" O" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows Mail\\Backup\\new\\is9DodWrchlovaRmNZDmAeg5cyZ9eRIX0hWztd6wF5ThsRZg6ulCq.exe\" O" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft Help\\cmjOTHW0J72EHhE7M.exe\" O 2>NUL" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IECompatUACache\\Low\\pD1BnnxeuQUVoMGAF33HhBSznA7kzVZYHYopFQq3KCq1LCpRYCxfcJ9f2gJyU8Piit.exe\" O" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\ae6vytmk.default-release\\minidumps\\yE64fcKNo9tXXlbdJCdCFdXNvRUw9.exe\" O 2>NUL" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Feeds Cache\\5M3RUT40\\qzRtwxMnOUwE77H4EqaWVDmI46pq7rUCRDfbT.exe\" O 2>NUL" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\DeviceSync\\IKRSdbpsU3LNovcFPHBr4vVc6L32Vvps6ldxH5c9OP4rur1Nliv5i23QUsL8wnPmGIY.exe\" O" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\S-1-5-19 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Subresource Filter\\Unindexed Rules\\q7RQ67YtQ7UP4ZErjdSYJEOeixTg4Dil8jie9BrAi4NaamrbNrucs0e88KEOXbt0kk6Q.exe\" O" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Assistance\\Client\\1.0\\Gn6cK8qLdrQAmjFPY3iO2Snkk.exe\" O 2>NUL" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-20 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000e006cb49e700d901 gpscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\57\\hhaBSJH5fSQzLtHK0J8jHe6VsKtB4DZz91SXOrhmgsWfBC.exe\" O 2>NUL" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Mozilla\\l1PVJWmJb2v4MyQDLTGrsd6OLWZgCXGNr8pYIbc7cfWwwojAdsygJ7uKPr06yz.exe\" O" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\GsLDz3jyolUNo7n3OIvO0nV66treFNfxJygeqgexdvOpOSm8A.exe\" O 2>NUL" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\ae6vytmk.default-release\\storage\\permanent\\chrome\\289W6aXIGr3xMx7DurgvQV6tPFJy4X5xl.exe\" O" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IECompatCache\\hpoOgSJk90V60QqBSwjEpoUo6K0TP.exe\" O 2>NUL" lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Media Player\\Sync Playlists\\en-US\\mnYh9b50fNovJQ7ddyVzbSCmJvxDFc0FJHVBBacNwetkjAHUHcnJo.exe\" O 2>NUL" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe -
Modifies registry class 12 IoCs
Processes:
808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\ae6vytmk.default-release\\sessionstore-backups\\XKKmYgJN5Vhz5D.exe\" O" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\SOFTWARE\Microsoft\Command Processor 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Command Processor 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\47\\KnZVJYFnes1LLMqJmVzV1naCd0L5sxq9aE1A7wUGh3LgP7v65mDiEgIeSkIzA7Jzc.exe\" O 2>NUL" 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exeAUDIODG.EXElEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exedescription pid process Token: SeBackupPrivilege 1648 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Token: SeRestorePrivilege 1648 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Token: SeShutdownPrivilege 1648 808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe Token: 33 1104 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1104 AUDIODG.EXE Token: 33 1104 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1104 AUDIODG.EXE Token: SeDebugPrivilege 2028 lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe Token: SeRestorePrivilege 2028 lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
gpscript.exedescription pid process target process PID 968 wrote to memory of 2028 968 gpscript.exe lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe PID 968 wrote to memory of 2028 968 gpscript.exe lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe PID 968 wrote to memory of 2028 968 gpscript.exe lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe"C:\Users\Admin\AppData\Local\Temp\808bcbf367c67385e00e9d54cdfed9d99b449b25bcbe50a2015044065370d6da.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1712
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1804
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:968 -
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe"C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exe" 12⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Assistance\Client\1.0\Gn6cK8qLdrQAmjFPY3iO2Snkk.exeFilesize
2.7MB
MD57bd1d833bebf149a937ada0f339ced73
SHA1b13e4ab77eb9bee53b82abdc294b82cb8657a330
SHA256b850de804ec5193fad54e361fe35cb0f716847851d250624858d6b82358802d0
SHA512ed31a4b888bbf9cddecb503301eab303be86951a2abbdc12f83d669110149f547cc63f38daefcad4d0cdd98cff21e8bd2c28f5033b6169acdc3934551d1cfd69
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exeFilesize
3.5MB
MD54f7de97e0b6fbc53eea257954e61e8fe
SHA176708519e3242ca189acd9ce81251e87298d1512
SHA256580a7371848e65b35cf22a5ce46ff7ecf485743ece400ad0ab2fe348ed85f9e0
SHA512ce9e6a77967a76225c2429c9f205c33b2b007dae8f41999141eb18fbe7edc1f17259e64eda8ba34a7c15251c12000a47aef5f5e3e64fc305c48a586abc2e876e
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exeFilesize
3.5MB
MD54f7de97e0b6fbc53eea257954e61e8fe
SHA176708519e3242ca189acd9ce81251e87298d1512
SHA256580a7371848e65b35cf22a5ce46ff7ecf485743ece400ad0ab2fe348ed85f9e0
SHA512ce9e6a77967a76225c2429c9f205c33b2b007dae8f41999141eb18fbe7edc1f17259e64eda8ba34a7c15251c12000a47aef5f5e3e64fc305c48a586abc2e876e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir\Q6tIpRCIR5.exeFilesize
3.0MB
MD535f7e6fba0f89326ef0be19dc74e76eb
SHA1d46992ceab1aa575c992bdbb5f21ddf976364503
SHA256e7336ddb92b25405466f8eaef99882bc8a598908b5c1e81276e38dfa77ce5e5e
SHA5122bb6d28cff48055a2e92223688ba4a947e883dfb28ebb852010e971639d894489d0e32816f38c4bb20fed4fef6d0ac6e81d79d9beae03e884454e6ad48255694
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Subresource Filter\Unindexed Rules\q7RQ67YtQ7UP4ZErjdSYJEOeixTg4Dil8jie9BrAi4NaamrbNrucs0e88KEOXbt0kk6Q.exeFilesize
4.2MB
MD55bf101894c1afbdd6e39397eabe12d2a
SHA151d994658fe48cff362e4fd1c2be6d5210611c7f
SHA25662d22b4529a936b3203274ffd31fca615a7f62595a46842a106f6a2e08ce8b64
SHA512d4886a2a9c34596871a0ec22b73ef9215520aaf74fee3b47e5bb9c33a7be9591e6791a12c6a95cbf263bf8db61e1b71cbb0ef50743552a6a6fdfa2d59d39582a
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\YB33FE3E\bwF0FLspqIxC4bSo72ykPEcjnUdnJBs6L7kY8gB6tpg9NgudPFx1DZ31l.exeFilesize
3.2MB
MD598b35e03ba100a7be35feb0b0781f47d
SHA11afc477cefaab0f64821ff8e722604a75a3ceb8b
SHA25663cc8b0fb016a229b56ea3fe4dc65a0cb288858b3b63139d75c0703c7ffe2afd
SHA5125bcb2e0d9a084a2cf7487d871c8f6a3554611a2f8c6d2f522a2125d36328b458d7100990b9a4fad86ef371d1f47bb52ae709ee9c69abba17d16f9ccc8e302890
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\en-US\mnYh9b50fNovJQ7ddyVzbSCmJvxDFc0FJHVBBacNwetkjAHUHcnJo.exeFilesize
3.0MB
MD5f8b629124ff2e19ac40372f79f124777
SHA188136418ebb24d41c073a8b4adc7e60b990ef734
SHA256dacfb365e31cbb45406a6f71fcd9d5731bbdc152e5efe1123775f23626e423b5
SHA5123c0546939af25efd92de23f1ab94b30ad5e8831681fc07a907e6861f5381136d042472da9855fee17eca6d914ba23cb876a3bfdd9f12d233a77178a4634f466f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Backup\new\is9DodWrchlovaRmNZDmAeg5cyZ9eRIX0hWztd6wF5ThsRZg6ulCq.exeFilesize
2.4MB
MD53b525644d3dff6463ab44da2677f9675
SHA19981aaefd478f551afe6bb3be1622c93a4bb2756
SHA25684f47bd56160daab14b2f87942aa9c6984b2b3b33bea22d37dd55baf5be72c98
SHA5122710ccc4dc4b4ffec480a29e55ea532810ab36a049770726678f5933b35458024b956ec7d3a152ac0fc93a0f2bececf2dafe7183857929a3d011969df1f4fef2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ae6vytmk.default-release\minidumps\yE64fcKNo9tXXlbdJCdCFdXNvRUw9.exeFilesize
2.5MB
MD5f211322b34489f5d0614c2a82efa98ec
SHA1ec4740e2ca351805edc9825f82f258d842c0ab74
SHA256bf5c76b6dfedc632316e683d4568cfa4bb44c5c11a7e705510227eca0d6c050e
SHA51220cb8d50bd42e8f06a19bc923454c811a820ad98ae2c838182d5a6ed1f71345f78055562e020a620a92c0e1f2d6a002ea32404e0569c1caed1961c4cda361d43
-
C:\Users\Default\Saved Games\xidijaEm5vPEdrg7.exeFilesize
3.4MB
MD5717e1d1aa01e7d2a9258f1af791b0c96
SHA102b2fcf2c54b317e1f9a4d64fb6e5bec62bd4214
SHA25683dae4ea15d8df626b9ac1e67eb1d46d2a2e21d9f5cc4b9023402cfc1d8fd975
SHA5127ce0239bce629ef3c4f585610e85fedd0e52791205e80ac4d4bc32daaddb4854f9e0952fa6fbc87c6b663ca83cf6f7267754804411af0bbb936d65cf9392e287
-
\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exeFilesize
3.5MB
MD54f7de97e0b6fbc53eea257954e61e8fe
SHA176708519e3242ca189acd9ce81251e87298d1512
SHA256580a7371848e65b35cf22a5ce46ff7ecf485743ece400ad0ab2fe348ed85f9e0
SHA512ce9e6a77967a76225c2429c9f205c33b2b007dae8f41999141eb18fbe7edc1f17259e64eda8ba34a7c15251c12000a47aef5f5e3e64fc305c48a586abc2e876e
-
\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\lEVOEtZDFXqK9qpFIUFyfWe3nfthkEr2caQbncpuvvqibhjo7vGZHMT.exeFilesize
3.5MB
MD54f7de97e0b6fbc53eea257954e61e8fe
SHA176708519e3242ca189acd9ce81251e87298d1512
SHA256580a7371848e65b35cf22a5ce46ff7ecf485743ece400ad0ab2fe348ed85f9e0
SHA512ce9e6a77967a76225c2429c9f205c33b2b007dae8f41999141eb18fbe7edc1f17259e64eda8ba34a7c15251c12000a47aef5f5e3e64fc305c48a586abc2e876e
-
memory/968-65-0x0000000000DB0000-0x0000000000DDD000-memory.dmpFilesize
180KB
-
memory/968-66-0x0000000000DB0000-0x0000000000DDD000-memory.dmpFilesize
180KB
-
memory/968-77-0x0000000000DB0000-0x0000000000DDD000-memory.dmpFilesize
180KB
-
memory/968-78-0x0000000000DB0000-0x0000000000DDD000-memory.dmpFilesize
180KB
-
memory/1648-54-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1648-57-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1648-55-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1712-56-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmpFilesize
8KB
-
memory/2028-67-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2028-63-0x0000000000000000-mapping.dmp
-
memory/2028-79-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB