Analysis
-
max time kernel
179s -
max time network
227s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe
Resource
win10v2004-20221111-en
General
-
Target
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe
-
Size
1004KB
-
MD5
d1e4eebb252d9e664903accc5f35b4c8
-
SHA1
651e71de33b020747a68538a0a04b1a9f1f90a38
-
SHA256
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e
-
SHA512
8184f295c287dc79632e20371b3e12713a0189e646d63d15ac9c6201ef0ff3de5510ffdc19af5f7d2e20e2dca18577ab53aa85cfb48c508beb926fe6bc6ef062
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
piBuLwJ0jZ3g.bat311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run piBuLwJ0jZ3g.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy\\TempState\\sILFxVFC4ejV7SvEX2g5LT.exe\" O" piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Win32WebViewHost_cw5n1h2txyewy\\Settings\\RQ6xGgOyPzVCDhwcbTqMd.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Shell\\64eLBU3dqJiQUFd4wggwmf0L.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows Sidebar\\zrymDZqxffYgMXpiRfCfTDDxE.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe -
Executes dropped EXE 1 IoCs
Processes:
piBuLwJ0jZ3g.batpid process 4964 piBuLwJ0jZ3g.bat -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
piBuLwJ0jZ3g.batdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " piBuLwJ0jZ3g.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe piBuLwJ0jZ3g.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " piBuLwJ0jZ3g.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe piBuLwJ0jZ3g.bat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exepiBuLwJ0jZ3g.batLogonUI.exegpscript.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\\AC\\Temp\\PHtDAIDBmiu1xEakhbjYUHd2QaJ6R9FGg6YTd3svZr2UW.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Crypto\\DSS\\JBgYNJNnzQj0abJCXqrFU1cqJ52CpsNTRMDPKwa9PTFi.exe\" O 2>NUL" piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\S-1-5-19 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\\SystemAppData\\USbu727jkgZskVjKWuoPtmteUBqrc6rp4gNqbKkE3XIHhbsHRiTEBH.exe\" O 2>NUL" piBuLwJ0jZ3g.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\es-PR\\dwCURwjqaqMHO.exe\" O" piBuLwJ0jZ3g.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\LocalState\\ShellFeeds\\TVI5ncdrxWKewmX9z6kNbYxHE1dR6olmwnEhesr1g2.exe\" O" piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached piBuLwJ0jZ3g.bat Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\kk\\jBAByx8jykYaPfOZkqGCsOqZPcPb9kc3uoM0RfQPJz3LhAAFmaTjI9AOkMz.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ParentalControls_cw5n1h2txyewy\\AC\\Temp\\OQtuq5c5Z2GwyGWkZJKJe90B6L0mWZvXNDkJFdi00rG0M.exe\" O 2>NUL" piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\ms-BN\\hZfEHEcx0xx3E3sK6tpD9JfnrRFZ7rk5b2KR2uPppL1vJU8WuBDIyP53Llh1J.exe\" O 2>NUL" piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.CapturePicker_cw5n1h2txyewy\\SystemAppData\\GINF7tVG5WHeSYDcpll8VbVN8G70i9BTjy3ckuOI29RSxjoYlrwdUI1Py3oi.exe\" O" piBuLwJ0jZ3g.bat Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{4234D49B-0245-4DF3-B780-3893943456E1} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 01000000000000008877b47deb00d901 piBuLwJ0jZ3g.bat Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\1RgZiQqpqXF9us55ls06uRfStnq3zFKbTsO2Ys.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\NcsiUwpApp_8wekyb3d8bbwe\\AC\\INetCookies\\ifjsfRjvAIHspomJPHADCjH1xfyevRY3FT17X7XPJXkBMSjXw.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\InputPersonalization\\TrainedDataStore\\AFevamqpyU1c3bNNakdc1c3gNXeXEjjIxt1HqYg8HRZN16AuRBUqAEz7.exe\" O 2>NUL" piBuLwJ0jZ3g.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.OOBENetworkConnectionFlow_cw5n1h2txyewy\\AC\\Temp\\nRmVQZpxlVpR1uUh7v6xMz3hfaya.exe\" O" piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\\TempState\\T5yUmfENQshlqk5tDtqFeJKYn3Chl81.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.CallingShellApp_cw5n1h2txyewy\\AppData\\aGr500UiyFFxGZnSZodF8e7KVza.exe\" O" piBuLwJ0jZ3g.bat Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "240" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\IRMProtectors\\h77b2DRXZjO9Y1eC6.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run piBuLwJ0jZ3g.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Storage\\ext\\gfdkimpbcpahaombhbimeihdjnejgicl\\def\\Local Storage\\of1XsQuzMp2VC5APD9RflqxjUkGMC8G.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\INetCookies\\PrivacIE\\TAW7Ckuf5QNx4mmkQSUaxZlGGuXZ7giR6HLhKms88ack6u44iLCULia.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Modifies registry class 10 IoCs
Processes:
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\Pictures\\Saved Pictures\\S2peSBMstzCSnsH8dXPEhzQwBzSIoDMvBNut65pkUTc5AehxYxRIS88MvrOH6QxHzfkH.exe\" O 2>NUL" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Command Processor 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Office\\16.0\\Floodgate\\cko3VybthkJP5llL078UmaxcGb5NO6qTnr3uq6zam1Uw26HyoyVNoRG48G1nrpNVKrhpAms.exe\" O" 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exepiBuLwJ0jZ3g.batdescription pid process Token: SeBackupPrivilege 4856 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Token: SeRestorePrivilege 4856 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Token: SeShutdownPrivilege 4856 311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe Token: SeDebugPrivilege 4964 piBuLwJ0jZ3g.bat Token: SeRestorePrivilege 4964 piBuLwJ0jZ3g.bat -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 3552 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
gpscript.exedescription pid process target process PID 5104 wrote to memory of 4964 5104 gpscript.exe piBuLwJ0jZ3g.bat PID 5104 wrote to memory of 4964 5104 gpscript.exe piBuLwJ0jZ3g.bat
Processes
-
C:\Users\Admin\AppData\Local\Temp\311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe"C:\Users\Admin\AppData\Local\Temp\311bd3b14f5017f67aeba0e28d1a45898a8f32f5db659e5bfae2e62efa8a3e3e.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39e7055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3552
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ParentalControls_cw5n1h2txyewy\AC\Temp\piBuLwJ0jZ3g.bat"C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ParentalControls_cw5n1h2txyewy\AC\Temp\piBuLwJ0jZ3g.bat" 12⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\bvek8JpZzsHRw820A009GKko1Xm4HmeB.exeFilesize
1.5MB
MD5f37065abe28fa46088e5726bf11e9a28
SHA19e49beec585d171f75809eb45b48218ae71dd787
SHA25600f7b1b1ab0548c10bff572c1191a5a04240c24d5fe601b4b95f3f3eea70fc45
SHA512fe2f3ec4428750465227f61029a0901f243d11fa37150f4ce0587e9876f1d44268a944e8ed8f50d6eff0538236ee48b4238721141083cf3b57a05fb414feca28
-
C:\Users\Admin\AppData\LocalLow\1RgZiQqpqXF9us55ls06uRfStnq3zFKbTsO2Ys.exeFilesize
1.4MB
MD520d02445384ffefaaff999663506ec69
SHA149029845d368873c95d926e8a3f0c4467f29782a
SHA2560f24abe5bf6092de31fd4db609355a5ab351e1b5862c1f9688e13b0ace3153ee
SHA512f5829812b4cfbcd321f9fc69e162e3a9584f1658df663541f213ca14e1f915bd7e5b1cb7c8fcdecc6621d220e34c19e50e1ab9d5369865bd12306ccc27449e95
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Local Storage\of1XsQuzMp2VC5APD9RflqxjUkGMC8G.exeFilesize
1.0MB
MD57a20ad572d4e279ffe13da823b28c924
SHA1eab6af9a9dd334c4703d4fa5f6393a8ec93bac43
SHA2567ff37235695a9a5258461aa5346cdd7a056f5275071f267955ebbbde720c9501
SHA51273e8befbf8202e012fe3b7e9c8412ca2b33ad9714f4b7a23f72ab0fdef4c905c4629ee0f144b2721b958d8570308f92e399809a598e06c0bbad3ee3b3a7ef025
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\IRMProtectors\h77b2DRXZjO9Y1eC6.exeFilesize
1.9MB
MD5623038fe1405a5e20c39dbed1850e7ec
SHA153e000038eb77581d24c15601a04ace0cd6bb3c7
SHA25677eed22d85828c5eba9f6b46591088d3b0d1a5f3aac85e19c03fd8f13f644522
SHA51230361031332afaee68e2a2cd5e51236365814b682b0e8e10392fe6f86b0bcfbbd9ae2e523dd31ce7da70672feab0188a827c2bded04eb3f415e25315cfd10719
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\kk\jBAByx8jykYaPfOZkqGCsOqZPcPb9kc3uoM0RfQPJz3LhAAFmaTjI9AOkMz.exeFilesize
1.1MB
MD5075fc68c6cea18f51961f87f73726095
SHA16cc42d738b5512961a2e2c888405c58bd7b94c19
SHA2567c2f4bd867d4f701e4b6ebe3c75dd2e97242b334d38bc891cc6343d930664212
SHA5121febfa6cd80efeb0a658a22a7539329192a91fc52b5bfe14db9421cd726ab63f4cf860aa40edfc39b87ec7b33fdea2e12bbab02e9fc57f4cc6a1145551e7cafc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\64eLBU3dqJiQUFd4wggwmf0L.exeFilesize
1.5MB
MD54a577cf027edd7d52eb83e4025085fa9
SHA15addec2b7c2d1d57931db59842edf03b409783e3
SHA256eda4702bc828959015484ebc2e276f3525258cdc2e5aa3ca3e9953d9801ad37e
SHA5122fd57608e0cf46b5a381071fef672a3065b095ac52061db6da1fa13b49f48f399fc5b6019dc6dd3d8ca9c6cc284b30519c5412db0076978a44155b7377edd1e7
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ParentalControls_cw5n1h2txyewy\AC\Temp\piBuLwJ0jZ3g.batFilesize
1.7MB
MD50b17a70cf4f0dc4c50d37c1c6cca3443
SHA1a19cdefd3a9c074de5b9d06717b7ef2a9499ca5f
SHA25626f74949518a993ac11c72a303bce0008ae4a076ebf47e7b8bc2692692fcee8b
SHA512afc3f84654bc7df06ea0c1f4a814b81367c487ccfc8822365238f7bb0b62b6a75871c10f84f54cd6207d802799e8ead73cdd752b66742853de177a4ceba420be
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ParentalControls_cw5n1h2txyewy\AC\Temp\piBuLwJ0jZ3g.batFilesize
1.7MB
MD50b17a70cf4f0dc4c50d37c1c6cca3443
SHA1a19cdefd3a9c074de5b9d06717b7ef2a9499ca5f
SHA25626f74949518a993ac11c72a303bce0008ae4a076ebf47e7b8bc2692692fcee8b
SHA512afc3f84654bc7df06ea0c1f4a814b81367c487ccfc8822365238f7bb0b62b6a75871c10f84f54cd6207d802799e8ead73cdd752b66742853de177a4ceba420be
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\TempState\T5yUmfENQshlqk5tDtqFeJKYn3Chl81.exeFilesize
1.6MB
MD51f05be8dd07c9de4199c02b33c004db8
SHA1a343e7d25dedf52306883753f4cff7ee01902234
SHA2566293a068a892566031e7a088610d0326bb44759b3ce8f104f6eed53245b86314
SHA51219f61be470bb6cbaecc644aae78fddd8411241b1e9553ec38eb04b6e647a2412c512a1b24aa660acdce982e7366ad3b985b052b07509543e39421e022ff794db
-
C:\Users\Admin\AppData\Local\Packages\NcsiUwpApp_8wekyb3d8bbwe\AC\INetCookies\ifjsfRjvAIHspomJPHADCjH1xfyevRY3FT17X7XPJXkBMSjXw.exeFilesize
1.8MB
MD58db3f20ae904f7c06eb049a0bf67bfac
SHA1a6dc0258bd3cd91d87e835e5f6434dad72c4d5f0
SHA256cff42208c7b67b002d79a4f7de98cf1b5926d6a8d3b1ce2b57c7b3e9f0c87f66
SHA5126b4a3863b148427730c11becbc2fbad22a78e1847034252b61c841d2d07a25b519a829816394a7f18991ea12e9eb5ce93eb1cf03db1cff99f33bcaa3d0b5b245
-
memory/4856-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4856-134-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4856-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4964-139-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4964-138-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4964-135-0x0000000000000000-mapping.dmp