Analysis
-
max time kernel
184s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe
Resource
win10v2004-20221111-en
General
-
Target
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe
-
Size
1004KB
-
MD5
d1e4eebb252d9e664903accc5f35b4c8
-
SHA1
651e71de33b020747a68538a0a04b1a9f1f90a38
-
SHA256
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e
-
SHA512
8184f295c287dc79632e20371b3e12713a0189e646d63d15ac9c6201ef0ff3de5510ffdc19af5f7d2e20e2dca18577ab53aa85cfb48c508beb926fe6bc6ef062
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exeprEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\dozshqpt.default-release\\sessionstore-backups\\OKv2gj1S76JufhEuYGQGN8VHqGimcynCaT36EjkE78KuVDb6Yilas.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\Favorites\\Links\\MbaHkbDblYuh4nKTnvIDexRTRQLSxHBob10yUhi5jXhdBTnkn7bJ5IjptM.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\Downloads\\XvB2RHf4KuYSOr09.exe\" O" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEDownloadHistory\\adKoI29ScV4YDkFqle1SsybGdEbUxDZDGdjRM0OcafUXPe8yyaO2YhI.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe -
Executes dropped EXE 1 IoCs
Processes:
prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exepid process 888 prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe -
Loads dropped DLL 2 IoCs
Processes:
gpscript.exepid process 1704 gpscript.exe 1704 gpscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 58 IoCs
Processes:
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exeprEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exegpscript.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Projects\\SystemIndex\\kYsZoPFHEX27ExDcYBNQ44kOaX9sP.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\NonCritical_x64_3eb5ea8473594499407cacbd9887e2953d50fd80_cab_04248dae\\eUIutYcrEmCNurPwLvmh3VWuUn3zWO0BbaPb4jyTTPGA9IyJu3URadUo3yZgOc032.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\data_reduction_proxy_leveldb\\gGODxAubcNJ6ESl93M6vpmbavQm0.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Package Cache\\{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}v12.0.40660\\packages\\Nas02XTiH0ZcHkxsJShfvHoJF39nv3pbjAJeivWou3.exe\" O 2>NUL" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\Documents\\u4aRAvb7zz2EXw12NhIFTPUOcSHbUh5HbuNk3qZnBKHb0I3R820TbEu.exe\" O" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\55\\12eBliM5a12hQom4lYPe95UeGT6j4Jv8cfhMmo30dj7fZWnAjjccM72UyYfhGhm6f8HHz.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 010000000000000050c6d493eb00d901 gpscript.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Assistance\\Client\\1.0\\es-ES\\PGm5QXya4hZ6ajIJ6agwIRGEHqdFlHIjZ6Hauks0p9CUdZaKkOevBNVVlvcRSY.exe\" O" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\WwanSvc\\1EItV2GO4r57ojo111At8JtAWVDGxCBZEmph5RfQx.exe\" O" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\9.0\\Collab\\REYRs32rf7AnTSt7HS9f7XN4t8NZG2Augl.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\Pictures\\dKtEXxT5wHPHBJObDcEBVGORVO3uFpoOHz3qHOsDcSV3lKD.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000b09a1fabeb00d901 prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Crypto\\Keys\\tfzVIs1hNAF2153k4Uzbq1yTZ03qBof5D6XutgxB.exe\" O" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\WidevineCdm\\7nzqnRa0zJbntY4JGpIVCaVUtDLp5wlfrD3scjexPo9cfRfHOl.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Package Cache\\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}v14.30.30704\\UxxQbfZFMWJmij0TGrTt453GmIT7F0Di.exe\" O 2>NUL" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-738 = "Start Internet Explorer without ActiveX controls or browser extensions." prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEDownloadHistory\\yTWzgQDOdiY3mIiSWkAFuAqM8XNtlbyl2DP4X4FNKeunotgOP4ByHyLjx9tWgi.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\0\\tIZKpFRe9zfG.exe\" O 2>NUL" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\Qjm5LxIpbrsLNO4t5oPtM4iXRFXDPNqwF6PNdb4sfKlF56n4eYaNsVKOT885Af6DHb.exe\" O 2>NUL" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\Flash Player\\macromedia.com\\support\\flashplayer\\sys\\rH7gFnleXkoARzTqHKohHg5xGnqR7W3.exe\" O 2>NUL" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Maintenance\\uEps2rGPaWi01AbaEIYF5XePiFoiZL1G0Nqyv.exe\" O" prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe -
Modifies registry class 12 IoCs
Processes:
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\OFFICE\\UICaptions\\c3BV2Fn90X9nC5vSfv4OiDbHQZ2UubiWMWoLwReajYCDbXcmkb553PDnSULw.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Command Processor 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\49\\e7LU69pF2XJDXwwlu5MYHt5Sunul7xzL66I4mFAievFupwcQMXyMKZqI7pD1uCaR14w.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\SOFTWARE\Microsoft\Command Processor 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exeAUDIODG.EXEprEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exedescription pid process Token: SeBackupPrivilege 1440 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Token: SeRestorePrivilege 1440 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Token: SeShutdownPrivilege 1440 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Token: 33 668 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 668 AUDIODG.EXE Token: 33 668 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 668 AUDIODG.EXE Token: SeDebugPrivilege 888 prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe Token: SeRestorePrivilege 888 prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
gpscript.exedescription pid process target process PID 1704 wrote to memory of 888 1704 gpscript.exe prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe PID 1704 wrote to memory of 888 1704 gpscript.exe prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe PID 1704 wrote to memory of 888 1704 gpscript.exe prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe"C:\Users\Admin\AppData\Local\Temp\311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x47c1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\en-US\000073E7\prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe"C:\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\en-US\000073E7\prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exe" 12⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_x64_3eb5ea8473594499407cacbd9887e2953d50fd80_cab_04248dae\eUIutYcrEmCNurPwLvmh3VWuUn3zWO0BbaPb4jyTTPGA9IyJu3URadUo3yZgOc032.exeFilesize
1.8MB
MD532216577286a20779444e74d18164576
SHA15c695b7dcfdf1f2cb76abe40becd7b1978674f4e
SHA2563ad86bf456ff521b0a4a7d2d3f6fa94fb015881ca56a90577506369ba5fba327
SHA51234cc9e5543b8345b5a66e94a0e8429d825f4e73f8300ac259d5c0fb3cb168f10d668441a6953513d21fe5cd393dff710de8f36aa0a590e4e469eb0ad3f8463bb
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\12eBliM5a12hQom4lYPe95UeGT6j4Jv8cfhMmo30dj7fZWnAjjccM72UyYfhGhm6f8HHz.exeFilesize
2.0MB
MD56e9a31ebd9b0b612dae1bcb555b494d9
SHA1f9395e5daeeeb765390b2819e36610d0fe9684ec
SHA256ce12c1e8d45f6d51a3c4c9e7d65819c208a193cecf5834ab10ca3637b798ff13
SHA512a83deebacdca3c6e66142195ad6a0f0fb0a9190c6b0fb95c051e9271ca7d7a5e75f0223d3b04117ecad2d14fb8b13bdc15bbb22e41497722fb364cf0c3da14dd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\WidevineCdm\7nzqnRa0zJbntY4JGpIVCaVUtDLp5wlfrD3scjexPo9cfRfHOl.exeFilesize
1.2MB
MD5ea67ae070920ed702df5b349d20c501f
SHA1511fdf5f0a2a25ffa71ff75e811bdb4bb871084d
SHA2561bc2f2ab16aef430e36d3612d79e4bf1b51ed8ce53da469b2e0ca6b6eddb3828
SHA51214d047a699ea8a3fb8139ce0f461bbcfb3a7f685b2d8606d029d65ed91e37af60b9d046a0414fd698e67c299b955dafaa6db9537128fe5f04e45735a54edc3ae
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\en-US\000073E7\prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exeFilesize
1.4MB
MD5748b2eabd49182b199729fd0a8e5bb02
SHA174e189fa819b207f941b98c3ca71f40b5a87ecb0
SHA2565ea560496dfbd6e8c3f98d4bbb0bb5d4d097451791e08493adf53cd6351084cf
SHA512d0a99c06e476867c8f92a4a54718b8209547b6f5f21db2772ce12e41ea470655cf00ba417da32cd143c870d02dd9ae66c4bae8ad169e3da965079fd04d38b49f
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\en-US\000073E7\prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exeFilesize
1.4MB
MD5748b2eabd49182b199729fd0a8e5bb02
SHA174e189fa819b207f941b98c3ca71f40b5a87ecb0
SHA2565ea560496dfbd6e8c3f98d4bbb0bb5d4d097451791e08493adf53cd6351084cf
SHA512d0a99c06e476867c8f92a4a54718b8209547b6f5f21db2772ce12e41ea470655cf00ba417da32cd143c870d02dd9ae66c4bae8ad169e3da965079fd04d38b49f
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\Collab\REYRs32rf7AnTSt7HS9f7XN4t8NZG2Augl.exeFilesize
1.5MB
MD5ab8b1d2518925cb69b6ac7f535d0dcb5
SHA182eccf424762d0608c562f30e1e82c3bd438739a
SHA25685decbf5db0b08b49450ac23de22b6c9bd5b817a4ab1097fb6efc565b6a1e1ab
SHA51276c80cde515c491ead782e226ae54f6a506d2eaea46c17999bf4a3dc95dde911de7759633609b64150795cf64f9b21bb75d811968cee5b9ff57d8c2115b8d7f5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\yTWzgQDOdiY3mIiSWkAFuAqM8XNtlbyl2DP4X4FNKeunotgOP4ByHyLjx9tWgi.exeFilesize
1.3MB
MD58a16fa1ed17ad0c067ca20c58e79eac7
SHA187966d7542744feff1a99f8e7a5e599acf0cee8f
SHA256ee7712560b783e01e71a02797cdd0de049fbf377cf7cad2eba63af4b49e3a5e3
SHA512f9af9a6d998ec0d7663cc54b87a163a6e690d68874b1fff48dae67f09833f9e7a35b44debe3fb6ed11cd82b6f6c234ab561bc4a9159df0c0a4d5b0119b87312e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\sOPYFIVP6K2YB72i3AlX4VwS9VA43S7djX4FZSvgOCvaHHK4.exeFilesize
1.6MB
MD558410efec7e7e183bbd8dddd46d9a867
SHA16fe2cccf8acce499a6a7851f0b2bab969a0fb9ae
SHA256c839fa1e14999cd753a7af039965abd0321218c3bc4d8f9d47623a321486080f
SHA512b266f5be48c3748b6283d8f4dc16ba93363f88219bd6107d55956ee63b4865c594742c5b02d9dbc890814919435f6f9a7ecbaf8bd4baa1b4a3f07241b18a608c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\dozshqpt.default-release\sessionstore-backups\OKv2gj1S76JufhEuYGQGN8VHqGimcynCaT36EjkE78KuVDb6Yilas.exeFilesize
1.7MB
MD54e173b953d1c6502e1b4ae60b535b1d7
SHA1503ca9a37a64142a68d3b7adcc480a7b9605b1ae
SHA2567ffb730b237696e784d526c69e9d11308579ab6b5abe4c4b1d38b15b52b1118e
SHA5121fa95814b9ff5f0d655f3a6cf7960ca77cc9c1cd0df9958ab8f94f589774719624575d47475dfc81489727c9c80c3fd9707f472c75ec97d41f03b6c255eec548
-
C:\Users\Admin\Pictures\dKtEXxT5wHPHBJObDcEBVGORVO3uFpoOHz3qHOsDcSV3lKD.exeFilesize
1.2MB
MD5a9276862facec04cd3c0de349ab5f9b6
SHA11ec540750f1c1a7d085a00f4f3d3291f4c22ab3c
SHA2560b2ca22b7de22df1e11a5779054343ee2d861a07a1693919d751e7cb209947d9
SHA512e9d5c090978ea0de54d25f7215fa0ad0561c1e1342a645329407a89913341cd418803c2a3ae3325d3658bdcf55bb4caac5b18d2d12e3521fd75867ec95593c93
-
\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\en-US\000073E7\prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exeFilesize
1.4MB
MD5748b2eabd49182b199729fd0a8e5bb02
SHA174e189fa819b207f941b98c3ca71f40b5a87ecb0
SHA2565ea560496dfbd6e8c3f98d4bbb0bb5d4d097451791e08493adf53cd6351084cf
SHA512d0a99c06e476867c8f92a4a54718b8209547b6f5f21db2772ce12e41ea470655cf00ba417da32cd143c870d02dd9ae66c4bae8ad169e3da965079fd04d38b49f
-
\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\en-US\000073E7\prEzx6iJDO7RugzftmbZRGgjQ6PuIleXQUUkrObiLwA2b.exeFilesize
1.4MB
MD5748b2eabd49182b199729fd0a8e5bb02
SHA174e189fa819b207f941b98c3ca71f40b5a87ecb0
SHA2565ea560496dfbd6e8c3f98d4bbb0bb5d4d097451791e08493adf53cd6351084cf
SHA512d0a99c06e476867c8f92a4a54718b8209547b6f5f21db2772ce12e41ea470655cf00ba417da32cd143c870d02dd9ae66c4bae8ad169e3da965079fd04d38b49f
-
memory/888-62-0x0000000000000000-mapping.dmp
-
memory/888-66-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/888-76-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1340-55-0x000007FEFB9C1000-0x000007FEFB9C3000-memory.dmpFilesize
8KB
-
memory/1440-54-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1440-56-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1704-65-0x0000000000C20000-0x0000000000C4D000-memory.dmpFilesize
180KB
-
memory/1704-64-0x0000000000C20000-0x0000000000C4D000-memory.dmpFilesize
180KB
-
memory/1704-74-0x0000000000C20000-0x0000000000C4D000-memory.dmpFilesize
180KB
-
memory/1704-75-0x0000000000C20000-0x0000000000C4D000-memory.dmpFilesize
180KB