Analysis
-
max time kernel
60s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe
-
Size
1.3MB
-
MD5
b709fe0a934ea6ff67b4381f59df3e94
-
SHA1
fbc7b851bc8ba989ba072aad6d41a989e2942baf
-
SHA256
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91
-
SHA512
e64d432a3cc9a9fdc12678e0e984c1cf50d6474dc65c9d1f7dc8bd341e37ffd8e715757c2ac9d2477e47d4db1fa949a30250eda111d7a1232b87cdc1343d9c8f
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmddescription pid process target process PID 524 created 588 524 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd svchost.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exeZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmddescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\CertificateRevocation\\ViQabK34uNxL9D9GkTvuBZ3s2vWuu1pnRkTW4aP3MqyleYZusXCec9bfh1M1CSMaa8.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows Media\\12.0\\dpW6xqgK2395ANow2n5a060pxdV7jr8biI1JosZoO73jhJ8pruMKumpDByeXFAoyKJ.exe\" O" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Internet Explorer\\Tracking Protection\\QAQuqYg0xX1DWWlB6b0dIo14sEjzrCJtO6zup5V.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows Defender\\Quarantine\\GJqUAIMubMGrP7yba41p2cXfi1leQczDABcSdCKwAwhXab8ONBr.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe -
Executes dropped EXE 2 IoCs
Processes:
ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdpid process 524 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd 568 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmddescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd -
Loads dropped DLL 3 IoCs
Processes:
gpscript.exeZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdpid process 636 gpscript.exe 636 gpscript.exe 524 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 60 IoCs
Processes:
ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exegpscript.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\SystemExtensionsDev\\KlZpivEQbCmJZasHlvyloLKrTego4KW8BKrVRP9hq80GI89T32wVjnsygQjkS4.exe\" O 2>NUL" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\GKqiOz3lPpVjOZaHCCwqOHinCxDu75r35QAn5DmN5bklRtB.exe\" O 2>NUL" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Assistance\\Client\\1.0\\q2q0FxL3EIxQXFkMZ0w78m1u8SErVak6aDwCDSGITAIQdUe.exe\" O" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Projects\\SystemIndex\\PropMap\\3YSkVKmnqWPp0AXuzaRmeXO4C1YNVhp5vXZKvmtVrsRodmlGDMac0Qh1Hk.exe\" O" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-738 = "Start Internet Explorer without ActiveX controls or browser extensions." ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Adobe\\Acrobat\\9.0\\Replicate\\Security\\vBZCPj1vHQxfIpmpu9n8LTjAZeuTAKPjXnrQ3LW3R7FLuotpG3dHD6UB.exe\" O 2>NUL" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\gUhKXaQppmzU19FJ42gWI5tJg7rPEsM3YB7uutwEsb1SAf9K8EWvO2Numk.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Media Player\\Sync Playlists\\en-US\\SX427cdH8NR0DNSfgZImiqUpKqeoRJqphOe8Ger5sSctDzwWwIhTBdayNiVgLp8DVCFCUc.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 010000000000000030dabccfe700d901 gpscript.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\eJwPecefq.exe\" O 2>NUL" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000908dc3d3e700d901 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\7ZGtm215f8lY.exe\" O 2>NUL" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\56\\QofwtLN1p0cNHVn9mPDURTQrtufVfBstT37gWOuz83enJcvLfFj0vjm9WKZdaZ2UuAtq.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Assistance\\Tlrb1eK5HTAYOncjZpZMTXRLy.exe\" O 2>NUL" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Package Cache\\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\\packages\\Vc66Qq2jzeWFmwDCElMg5gqAdYiw.exe\" O 2>NUL" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Storage\\ext\\gfdkimpbcpahaombhbimeihdjnejgicl\\def\\Session Storage\\TYFSeWoaB1u900ZauhEyRLGnXTDnFAc3JE3Jo6XPa.exe\" O 2>NUL" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\OfficeSoftwareProtectionPlatform\\boCyZi6WESCU2XihXXiM24oDtMuJ6OmlKALMvzlQaBbwkPrkr.exe\" O" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached gpscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows NT\\yCcT08YhjRKhCnNZZohlQKpkOGcRMbi5zqVW.exe\" O 2>NUL" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\au9ni2dm.default-release\\NS4ch9XCf8mNIuf28c16YAIAJa6PmePtq6syPxqPkunnzf.exe\" O" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%systemroot%\system32\windowspowershell\v1.0\powershell.exe",-111 = "Performs object-based (command-line) functions" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\54050A5F8AE7F0C56E553F0090146C17A1D2BF8D\\packages\\Patch\\H3TzKg4K3gC.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Explorer\\5my6DcKAtEssGXRUhApnUtluHkUyBTnn48.exe\" O" ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe -
Modifies registry class 12 IoCs
Processes:
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\Caches\\NdAUF7pzFGONlTzZ5jv8CNKF6DN9JMTHxPAgADckyiMYTHtNYx2.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\SOFTWARE\Microsoft\Command Processor 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE\Microsoft 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE\Microsoft\Command Processor 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Default\\Favorites\\DjKoGkDTYwqf7gGdJdCq3VUG0.exe\" O 2>NUL" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE\Microsoft\Windows 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdpid process 568 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd 568 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exeAUDIODG.EXEZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmddescription pid process Token: SeBackupPrivilege 1672 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Token: SeRestorePrivilege 1672 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Token: SeShutdownPrivilege 1672 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Token: 33 1648 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1648 AUDIODG.EXE Token: 33 1648 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1648 AUDIODG.EXE Token: SeDebugPrivilege 524 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Token: SeRestorePrivilege 524 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Token: SeDebugPrivilege 568 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd Token: SeRestorePrivilege 568 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
gpscript.exeZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmddescription pid process target process PID 636 wrote to memory of 524 636 gpscript.exe ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd PID 636 wrote to memory of 524 636 gpscript.exe ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd PID 636 wrote to memory of 524 636 gpscript.exe ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd PID 524 wrote to memory of 568 524 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd PID 524 wrote to memory of 568 524 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd PID 524 wrote to memory of 568 524 ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd
Processes
-
C:\Users\Admin\AppData\Local\Temp\12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe"C:\Users\Admin\AppData\Local\Temp\12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd"C:\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x56c1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd"C:\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmd" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Assistance\Tlrb1eK5HTAYOncjZpZMTXRLy.exeFilesize
2.5MB
MD536795ddd186e4440a2de9e66c0942216
SHA14f858a8ca75fdad944001ca8a52eb6d6dcedd79e
SHA256fa0821fb018d70b969f1859b070fa238b2490144bb7689ade0ba578c4d90661c
SHA512a52bf27fd2b7cd23245eacf13fd70e401ae01fc962fd9d858ffaee3a53c396830eec73a58faf2922d53aaadd7b15a55b6a0f53e769513b5aa3c4a65fd58e3df0
-
C:\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\fr-FR\YpheKMcKIHyViwoiaTItb9ZscSEUfOMAOwQMafstUDf.exeFilesize
1.5MB
MD585bc6bec0cd69d71e90e83bcc9b2d140
SHA1a1d59fb37940922f9ed494875a6403fdcfa1fee1
SHA2562f56096552031ecbba58b912d5b82b4f014949f4755b104e73f6c21079314007
SHA512dfa6bf8d8967a3e1c2e170570f590ddfa8e03d03b459ef65b7ce6e6594694188c1ef9a1a612dbcbbd82f6bac153caea5856ef739f9cfc2c364cbc450458bc47a
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\7ZGtm215f8lY.exeFilesize
2.4MB
MD5ac8ade8ac909f2c6e2c3cb2a1f5852e3
SHA1e8451126de575c057ab9ae25b71ccc6d2fe13aa9
SHA2566db52c89d50a57bd8740a22e3a320d672004b364d04c6d5c8f62d5ac8588b8a5
SHA512c5fa75859e906793dc656e8a854a8e052d2ef105a3c27b9a6eb454378c654f7988340d538a7fcd221c20b3a8dfd7a2db14a6e9120c47f390b44c66db591c6fb1
-
C:\ProgramData\Microsoft\Windows Defender\Quarantine\GJqUAIMubMGrP7yba41p2cXfi1leQczDABcSdCKwAwhXab8ONBr.exeFilesize
2.0MB
MD538ac2164367f2d7ae72a1ee7d99f2673
SHA16b99b7cfc81aaa3343d33cc44dcc823a6d856cfb
SHA256d863a65408ad5edc272c6ecc48efc7d398d9c5049395f009681236a2234fdf2a
SHA5122839fcb2d3fabf785ce6893865e4552303a2df2db9b6d440233bf4d68e2e023e5f950eeaa62e01ff319e1ce4da02dfcbc23ff88a159298c1df44057a92795f13
-
C:\ProgramData\Package Cache\54050A5F8AE7F0C56E553F0090146C17A1D2BF8D\packages\Patch\H3TzKg4K3gC.exeFilesize
2.0MB
MD55c53fb589d79ebfcb190d2d200b94129
SHA15a388ff05930cbbbf9de2e9c585a1aa2951b87a0
SHA256c80d69d261d47d66077abff1aaad927e31550375289eaf8363e32ddce533c4af
SHA5124c0b0ff837523ee32248a5f981ba3bfa1bc2bcde5f8a00d98b8bd1a11a1ff9a215667506f554e69f6715fa0a26adb58833a7d7cdb1fe10fe699a556078592733
-
C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\vIHSbzfJz8YRV3SXVvEU6M6QA908wiOMTK.batFilesize
2.1MB
MD50eb1cfb762634106bb57d1c17f946c15
SHA1cde5527261d4d0c1232d11f98f48fae4beb88a16
SHA2560c7586434f0ce193bc9dbbfe70677b7e5c1dc96eeffc4f5efd13d5852cdfb1f2
SHA51290878b87793061d9e3e75b954124bdbcc3c15bdaf14c8591ba645b3e72fab3d1d3eeea2b014a9ac35742c2cf2402662c9c401b4fe2f7f0b8ad622f570a8b793a
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\QofwtLN1p0cNHVn9mPDURTQrtufVfBstT37gWOuz83enJcvLfFj0vjm9WKZdaZ2UuAtq.exeFilesize
1.7MB
MD512ac17834da1e52161e71538e9c6ae21
SHA103cfd6704589b900ea634867070d36f8eb9305b8
SHA2566de71756e9b7a7909add8ed44dbf0c7a799fb9220dd4a6ff1ca346f059deedd1
SHA5123b4ff812d3d2acd20fd5916e0c9ecd9fe18cd53d366e1900196f205f0fdbaa62758d80f3b81ca5973f6c6a7babab57517381bbf525be95a7d9e4cc5db0655541
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\gUhKXaQppmzU19FJ42gWI5tJg7rPEsM3YB7uutwEsb1SAf9K8EWvO2Numk.exeFilesize
1.5MB
MD58af0770fc2f0a660cd8b79713f5d2034
SHA181d2d5e2e6f4509f2278d2234e7fbbdb5543e85d
SHA256ac5289a8cba6106b3e317eea3726d104066d25b97a878d84d6e03ef83edd4818
SHA51288fab4d94af00be6001f8dcd8013656daec7e102f79b852e7cd615bd576b3798a34552a8cdf7f6e568694c83f1e72f890872a3be9eb1fcf0f656e9e98bced9bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\SystemExtensionsDev\KlZpivEQbCmJZasHlvyloLKrTego4KW8BKrVRP9hq80GI89T32wVjnsygQjkS4.exeFilesize
1.6MB
MD5ce13304a9a1ff78b3ebd611e3c4e1e90
SHA15d6cce41018f1f782110e04f7560b0ef667389a2
SHA2564af556a84eae4e6b8c4cef9ae502f6929060abae2d26f122dbfb88c628378638
SHA512dd7d905b4776d24187bfa6142b3844a90167f70d067687d888886d6806e77c336d7a389ca897d0324f9fc23eb4007271d7e10b2c1a06cbf1f946e01b81dcff19
-
C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\xiGj2FfyONgtY6m0.cmdFilesize
2.7MB
MD5d0bb4d6a29ba7c7fe20219f2654477f1
SHA1b10afb77a9dbecbd947bca7562eed447412b4bdd
SHA2561b84a4e0afe74f66ed99cc2f5a2c9821720ed816af8232d21c482abfc84ab884
SHA512d943a60e02bbaebd7e92ed6b6ce605101b8cb268702e5437aac167f89544bc920af123dad5b93747877a0f1f84c14707e8206eb7ee5fbe5ce7d39b22306dec36
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdFilesize
1.9MB
MD5ca8a1387a6d7c52efbf9c1f4d77ab046
SHA13ce045d2ae92b2c3ed4764cc224658a44aa41c2c
SHA256ed88c56957d02519cde36348998d38b4b21a806e4370a7b133c3a4b6308a5001
SHA5125e0c7ad1b784fa7215536ba24ff4b612165dab2ee4dbdd88269acd9861c1601ed412a3b279e53af0193c8e4756f1deba54fc8bad79e5366b4c53e546ca618963
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdFilesize
1.9MB
MD5ca8a1387a6d7c52efbf9c1f4d77ab046
SHA13ce045d2ae92b2c3ed4764cc224658a44aa41c2c
SHA256ed88c56957d02519cde36348998d38b4b21a806e4370a7b133c3a4b6308a5001
SHA5125e0c7ad1b784fa7215536ba24ff4b612165dab2ee4dbdd88269acd9861c1601ed412a3b279e53af0193c8e4756f1deba54fc8bad79e5366b4c53e546ca618963
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdFilesize
1.9MB
MD5ca8a1387a6d7c52efbf9c1f4d77ab046
SHA13ce045d2ae92b2c3ed4764cc224658a44aa41c2c
SHA256ed88c56957d02519cde36348998d38b4b21a806e4370a7b133c3a4b6308a5001
SHA5125e0c7ad1b784fa7215536ba24ff4b612165dab2ee4dbdd88269acd9861c1601ed412a3b279e53af0193c8e4756f1deba54fc8bad79e5366b4c53e546ca618963
-
\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdFilesize
1.9MB
MD5ca8a1387a6d7c52efbf9c1f4d77ab046
SHA13ce045d2ae92b2c3ed4764cc224658a44aa41c2c
SHA256ed88c56957d02519cde36348998d38b4b21a806e4370a7b133c3a4b6308a5001
SHA5125e0c7ad1b784fa7215536ba24ff4b612165dab2ee4dbdd88269acd9861c1601ed412a3b279e53af0193c8e4756f1deba54fc8bad79e5366b4c53e546ca618963
-
\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdFilesize
1.9MB
MD5ca8a1387a6d7c52efbf9c1f4d77ab046
SHA13ce045d2ae92b2c3ed4764cc224658a44aa41c2c
SHA256ed88c56957d02519cde36348998d38b4b21a806e4370a7b133c3a4b6308a5001
SHA5125e0c7ad1b784fa7215536ba24ff4b612165dab2ee4dbdd88269acd9861c1601ed412a3b279e53af0193c8e4756f1deba54fc8bad79e5366b4c53e546ca618963
-
\Users\Default\AppData\Roaming\Microsoft\Windows\ZqCCX6vQ7ReOCVMzFknqTq6PL9K2xMbE.cmdFilesize
1.9MB
MD5ca8a1387a6d7c52efbf9c1f4d77ab046
SHA13ce045d2ae92b2c3ed4764cc224658a44aa41c2c
SHA256ed88c56957d02519cde36348998d38b4b21a806e4370a7b133c3a4b6308a5001
SHA5125e0c7ad1b784fa7215536ba24ff4b612165dab2ee4dbdd88269acd9861c1601ed412a3b279e53af0193c8e4756f1deba54fc8bad79e5366b4c53e546ca618963
-
memory/524-62-0x0000000000000000-mapping.dmp
-
memory/524-69-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/524-78-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/524-82-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/568-80-0x0000000000000000-mapping.dmp
-
memory/568-86-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/568-85-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/636-77-0x0000000000E90000-0x0000000000EBD000-memory.dmpFilesize
180KB
-
memory/636-67-0x0000000000E90000-0x0000000000EBD000-memory.dmpFilesize
180KB
-
memory/636-68-0x0000000000E90000-0x0000000000EBD000-memory.dmpFilesize
180KB
-
memory/636-76-0x0000000000E90000-0x0000000000EBD000-memory.dmpFilesize
180KB
-
memory/1672-56-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1672-54-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1868-55-0x000007FEFBC01000-0x000007FEFBC03000-memory.dmpFilesize
8KB