Analysis
-
max time kernel
44s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe
-
Size
1.3MB
-
MD5
b709fe0a934ea6ff67b4381f59df3e94
-
SHA1
fbc7b851bc8ba989ba072aad6d41a989e2942baf
-
SHA256
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91
-
SHA512
e64d432a3cc9a9fdc12678e0e984c1cf50d6474dc65c9d1f7dc8bd341e37ffd8e715757c2ac9d2477e47d4db1fa949a30250eda111d7a1232b87cdc1343d9c8f
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exeaCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\GPUCache\\irEGxvsQy62g162Ef3rtiBylQBkRBiCC2ig3xwX5tJc.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\\LocalCache\\DN9yLAkcjcWgt7bb8SuthlReQW1sFIsV17UmygV9usdrxytDvnu3U5ymdfcM6p.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\ja\\MRHsKVFQZ8rVzlUNWCSCsFXRN0JeqFtrM.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Adobe\\AcroCef\\8HDoBxotm9jUNhPNZVZm0eRL5JrpPf6btCJvGt6S5vclaWnsbFiSlUn4VtbvjUClNJeJ.exe\" O" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe -
Executes dropped EXE 1 IoCs
Processes:
aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exepid process 4208 aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe -
Drops startup file 1 IoCs
Processes:
aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\N2ZcE9KLmEODquatCjjQa389ZBYi4UjEyAL5tLuogsn1vQWjTwF05KzeLfg.exe aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exeaCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exeLogonUI.exegpscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\8\\CwbrhY1x0F.exe\" O" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Device Stage\\Task\\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\\fr-FR\\19d1Tj5e2te.exe\" O" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\kok\\sTUa8fyOYbh9TWx1LsW6MI7iyVKl8v5c4PXKonKZIDpFPgDZxVzuCCNvOZNMQZFb.exe\" O" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.AsyncTextService_8wekyb3d8bbwe\\AC\\INetCookies\\Zs0Qc4BVtHU8Ib5asKtcU68l6c8z7Z39ZF6MbqKAfBzjpjHH.exe\" O" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "182" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{4234D49B-0245-4DF3-B780-3893943456E1} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 01000000000000009476d8d6e700d901 aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ParentalControls_cw5n1h2txyewy\\LocalState\\OvXVPNMooGFDg8JitSrYAmuDu0TqP1.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Diagnosis\\Temp\\DiagTrackTraceSlot_miniTrace\\A0v2c5jdUtR2rajYhW1S08gsfLVfP5LTuQc4jvCeYlQcOj30AQeaMThfMjY9sDhn4exCZHw.exe\" O 2>NUL" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\ShaderCache\\GPUCache\\1WbMGqTwmBs1woVoFPBGR04FjqEKr.exe\" O 2>NUL" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\bg\\izhvZSQneV2drEydcqCo95ySXGQYQCws4umIi2TYFX.exe\" O 2>NUL" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\MSHist012022081220220813\\WGMsU1U1h7oAKukLL4vpKyM26zFcMZMK0D.exe\" O 2>NUL" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\S-1-5-19 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Crash Reports\\events\\0RNExa2QjVd4DM.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\\AppData\\tyqMsCgvW4Dj.exe\" O 2>NUL" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\GameExplorer\\zTemsivTrAs2E3ahCzKsEywqiJPldPn.exe\" O 2>NUL" aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\.DEFAULT 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\TargetedContentCache\\v3\\338389\\8HbZDAouZLWhP1aDNlI9UyYdfeLtAvW4lGlX9WGakBzsHBaV0RyR9z.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.CallingShellApp_cw5n1h2txyewy\\AC\\INetCookies\\PtGwIGSScIo.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe -
Modifies registry class 10 IoCs
Processes:
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Command Processor 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\6\\Kw62bMSOV.exe\" O 2>NUL" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\ContentManagementSDK\\Creatives\\280810\\yNpEPkdcIIDfHyhLQXnzJ.exe\" O" 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exeaCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exedescription pid process Token: SeBackupPrivilege 4792 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Token: SeRestorePrivilege 4792 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Token: SeShutdownPrivilege 4792 12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe Token: SeDebugPrivilege 4208 aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe Token: SeRestorePrivilege 4208 aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 2320 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
gpscript.exedescription pid process target process PID 2152 wrote to memory of 4208 2152 gpscript.exe aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe PID 2152 wrote to memory of 4208 2152 gpscript.exe aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe"C:\Users\Admin\AppData\Local\Temp\12ccf80129469d1b6acc8feed64f989d98dc74725b9e562a5be7cc0db27c6a91.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3981055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe"C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe" 12⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe"C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exe" 21⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exeFilesize
2.0MB
MD56b6ccee5a95498e66502141bbe0e30a2
SHA168675c1c407f3499f5b2cd7627286c8f71c7ac69
SHA2568036ea5dd882b34de79fde93169c6f597c4c7a2fa71913a6b61ad1a9784ee808
SHA512949c05975435f73d245203214483262a92017150525b22ab5f62ac2969dc97d6ea6267371e77e61295b87d09c6fe7db43d0450a515ee4b4e74328b86b6b8a679
-
C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exeFilesize
2.0MB
MD56b6ccee5a95498e66502141bbe0e30a2
SHA168675c1c407f3499f5b2cd7627286c8f71c7ac69
SHA2568036ea5dd882b34de79fde93169c6f597c4c7a2fa71913a6b61ad1a9784ee808
SHA512949c05975435f73d245203214483262a92017150525b22ab5f62ac2969dc97d6ea6267371e77e61295b87d09c6fe7db43d0450a515ee4b4e74328b86b6b8a679
-
C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\aCh9nlwqQ97W6deqCBPjuL6GIC1BoBOFWRA.exeFilesize
2.0MB
MD56b6ccee5a95498e66502141bbe0e30a2
SHA168675c1c407f3499f5b2cd7627286c8f71c7ac69
SHA2568036ea5dd882b34de79fde93169c6f597c4c7a2fa71913a6b61ad1a9784ee808
SHA512949c05975435f73d245203214483262a92017150525b22ab5f62ac2969dc97d6ea6267371e77e61295b87d09c6fe7db43d0450a515ee4b4e74328b86b6b8a679
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.CredDialogHost_cw5n1h2txyewy\RoamingState\1s0Eh6XLq3jZOabkKZ95sEuJ2Y7MUMCo4CZuDvgz2ajIQoFpeRia8X1iQC.exeFilesize
2.0MB
MD5aeaa88bba6b16eac0553b38da37194a1
SHA100a5985ad0a45f2623a5b232b4c80441c0ae135c
SHA2565cd41343c4fe1d535999c56780fda288853d352c68fc3c76a7cc9d70b56c495c
SHA51275e1d6a7fb917bcbb4b9b988318b0988f7d3517c20c7f00c139816ef720afb9036d198614b794e1441d3a9c139f8fee9e4944a9151ca5849477e0286e7e69d9f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\LocalCache\DN9yLAkcjcWgt7bb8SuthlReQW1sFIsV17UmygV9usdrxytDvnu3U5ymdfcM6p.exeFilesize
2.2MB
MD598f2a248587431cb3b591b6e7df5cd9b
SHA1c28dc6d2932d2187735b9de590ec686c8b769650
SHA256068e79bc2d61a74aab1a19b36171ac29176792e419eb7a137ad048d3d9090cb1
SHA512e76bfacac7151ce88c184842b8f2181315048fa4870d77e8f1993319bd123e46e58c19472f9074b8dd4dc8e575c83983a1ba9f83208ea97d1b176c054ff2816e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\Settings\KjKZZj6NFSSjkujrfyzjRDIjlGFDvQBXTdxZ3IP8p.exeFilesize
2.0MB
MD50b9c90db3f26eca6c384d56e1a792515
SHA146dabd112d261d2b6b772858a2b5dd22c0df4603
SHA256abc8ffe51b62894a706bc8c0820dedd37b8c412a8230498f7a0323ccaef7a18c
SHA512fd2a7fad7cdbe51b7964f4bcfc686a7b54f41b8233fda72928767d8651dad10ae8df6878c4e993db32d9f17dbae5ce00102a631d4d9dd0c1ee945579a6341704
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CallingShellApp_cw5n1h2txyewy\AC\INetCookies\PtGwIGSScIo.exeFilesize
2.2MB
MD5bf68affff301ab68745997c25213f882
SHA10b4a266c879d2ffdc411a8815d64a26d9bf987ad
SHA256d26c4c428d57dd944ff88bb622df413f847d0326dea73dbaa66992abf72213ba
SHA51207f44fb7a6d2e38449d158c83e75a58d8bd5f630512059c02b2f2c54901642537a5667d0b2767055a0b0dd12b4fd270cb6ec847715f9d06190ee886e60d98d26
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\TargetedContentCache\v3\338389\8HbZDAouZLWhP1aDNlI9UyYdfeLtAvW4lGlX9WGakBzsHBaV0RyR9z.exeFilesize
1.3MB
MD59955c48221340ecdc46dd042851ada96
SHA138f9b4b3f95d22624f793ad728475f8a989cf1a8
SHA2566b99fbd677032ece9c5a9672db17a9a80ff77de4f3deb4b56dc197ceff8f6f3b
SHA51252a9906d228a016948a354907168cb9a62c1c8a231945de1c0330b5700186dff655b9009d26fdead74363ddf78d710f37bb4aec17483531217539fbcd13897a8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\LocalCache\BiAF1KcUHgAvk0QnT766te59rnQE370ZDJd6twwyB6Cac03NHwppHYUX04FCVjKOEyVgKQ.exeFilesize
1.9MB
MD50361a2474ac150a75f8b5d8ff179f309
SHA1212a107da2db6096914a470b3618d751bb3d4442
SHA256efd0bc9304e9b390a0d48d7e948b5deaa93bb77fc427a32eb2a75d6a0d0f6f15
SHA512451410aaf43ec93aee48569e01a43d81e7e77fa62000813114ea2968b0d0f7f0cc2d68c7deea47dc95a57791fae8d59a372f133ad22b2949f08e2337a6832dd2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.PinningConfirmationDialog_cw5n1h2txyewy\AppData\tyqMsCgvW4Dj.exeFilesize
2.1MB
MD58bb51d5447d260ac49e95040e2f51025
SHA1c66d19c44994929456e6cf23ab9e40a7db9cbaa4
SHA2568f56742904b9092dc969a15ac5d86aec3428d11bc3bad98a793bc54bbe13f854
SHA512bf0bbada838410409a8c5a3ae2a2ae7d822234138e5fe4ebe99798ab50b821b89eb90512e4b372dc841578840cddb91c8aab84c8227a4449aedc929b0abe4e93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\events\0RNExa2QjVd4DM.exeFilesize
1.7MB
MD5871c33732aebfbb30e3c3b2f61c42e42
SHA15fd1f5baa350a1689058ab5203d7473163e5e971
SHA256ed6d7fa937344ab3d07abcccbfeafd992c1c4c33d98b0b76486533416c091a7e
SHA5122e3b1386dda95845eaba38ffedcfac86071db5c78c58679547ddbcc14485010f10fd0440236b4a8f331f629dcf6c839080ec5e46646fd1a97e90a84127b39bfd
-
C:\Users\Admin\Pictures\7scMrxjOblZTs7eX7axYHVFunqhZUsBacRzCvSwyKQ1XPyF9TA5OMhNyYGXboMM72lhVsg.cmdFilesize
3.8MB
MD5e8ad7dae08f8d8f3988c05371bb37ff5
SHA15850b8474d7ac9e1ca8ce06ff70b14b458fa23ea
SHA2568cea7b864370fd5a8ed10217ed8b117108405d86aad39f0249e7618296d734f4
SHA5122c9da7dfc9f0a8e01e357291c08e3bd7a8950d5a09e35964dff7c90433a4da44106030f3fb220f40f29bc673aec9c520a7eb5cfcdeaa5672890ed6313b17c20c
-
C:\Users\Default\Downloads\4oShElEQTF0Q.exeFilesize
1.9MB
MD5e042d1a36ec07d3dda7f09708743ed1a
SHA19b89195d047f23e0c4e2581b356f155bc493292e
SHA25689b5648f6cfbc4460af5c939b378a794e3ef61676e57baad958bf965365a2e78
SHA512e8b822bc7afe4504811adb249cc8ed62f269ceddd80783db80df410fb1ed3b95ee432bf6d7371610cbadad8c2c0cc9297e2e7f5733578cc0e72437bfadbb788a
-
memory/2656-148-0x0000000000000000-mapping.dmp
-
memory/2656-151-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2656-154-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4208-136-0x0000000000000000-mapping.dmp
-
memory/4208-147-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4208-150-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4208-138-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4792-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4792-134-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4792-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB