Analysis
-
max time kernel
185s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:26
Static task
static1
Behavioral task
behavioral1
Sample
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe
Resource
win10v2004-20220901-en
General
-
Target
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe
-
Size
1.8MB
-
MD5
ef9899724839613d026e95cb1a7fd60a
-
SHA1
b4325c37c26b27bbc1cba63e413c6ddf56e7f083
-
SHA256
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01
-
SHA512
5fe426c2f5e07678150936975415df1276e64203505bfb680d429834896b0ced4c1c09b51533b91acec0a31d86a345732b625ee40bb60c8acb6b5fbd787e083d
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exeiAnYaHo8FWs2SAMHukehSvO95.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Assistance\\Client\\1.0\\de-DE\\BUgneKRyUxjPVdGMVSitMkBGxJaAkco7WOpsai93BHhgg31BXmh.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Adobe\\Acrobat\\9.0\\Replicate\\U0FzNPgxmmEveiofIr3lhE547GJvauj6jTMjlsPuUcshjXUqUsFpjCvtYM4iBz3IwjXnpZ.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows NT\\MSFax\\VirtualInbox\\fr-FR\\dlNiRrNO3jx3b8e5kMMRKFx34q0HxNsPLO02zMZKcwu.exe\" O" iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\44\\ecdwVRoFYX1RMlHL5ZtjBCP5z6vgUSNLCPvpeOC.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe -
Executes dropped EXE 1 IoCs
Processes:
iAnYaHo8FWs2SAMHukehSvO95.exepid process 968 iAnYaHo8FWs2SAMHukehSvO95.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
iAnYaHo8FWs2SAMHukehSvO95.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " iAnYaHo8FWs2SAMHukehSvO95.exe -
Loads dropped DLL 2 IoCs
Processes:
gpscript.exepid process 1944 gpscript.exe 1944 gpscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 56 IoCs
Processes:
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exeiAnYaHo8FWs2SAMHukehSvO95.exegpscript.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Adobe\\Acrobat\\VY60dzqyH62Z1zUAuuXjsv8cNVeGC8qFyDTK.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\ae6vytmk.default-release\\94tyOzQvW0lBzmYrF65VOYtOz3xM3YujAxXG8wo0jzvL.exe\" O" iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows Defender\\Definition Updates\\e98bhsJHJTL4TJDY9g52aat71RaDSNCbsRBNEfoz6RNwqBklvk3n3YCPNxwA2YzFLLgVcSU.exe\" O 2>NUL" iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Public\\Music\\Sample Music\\Lk6FhI909n0vZoxWqctexUjbD5xi6Wo3z5I7QXX98V03UnSaLWiKuvRWFKoDXYFRNdWNU.exe\" O 2>NUL" iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Assistance\\Duh98ULK6AXvqzcfi43PL729CX0pyerTmURRQLy6Vmdnd8DKPMe1RWbzU4CQkBwCR.exe\" O" iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows Mail\\Stationery\\vVeyGfArOEhSl5EwpA4gb7czl7iAe2KfBhLMNtj36YTOdg9eGvFI9mJYt.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Tablet PC\\To3330EugyZW1Nu2r.exe\" O 2>NUL" iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Device Stage\\Device\\agVTMBHDuAvBMrlhfZVjbjjsMgkMmpSXfcPlgH.exe\" O 2>NUL" iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-738 = "Start Internet Explorer without ActiveX controls or browser extensions." iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\.DEFAULT ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached gpscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows NT\\MSFax\\ActivityLog\\04EhTIlJPCEQ50OLXPfllZRI3fOu2Igy7Yw3dtOb079SX5bND151kECyKitxOEhtpUDoqR.exe\" O" iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}v14.30.30704\\packages\\vcRuntimeMinimum_x86\\GYBOzX3niCZgBdCPaS9xH0n.exe\" O" iAnYaHo8FWs2SAMHukehSvO95.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\32\\NCVBeZ9p02lVgYARmS2cSVqp9xDrw7PN4onRPHIKicv85zFbjGi6b.exe\" O" iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Internet Explorer\\Recovery\\High\\l1TqC3Ok1u1ddN2AMv7Ih9fu5CMf4DUL6fadGC1.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\46\\FbeqK8gxqkYlJ0adhBdFYdElMS65I6H3DwikhNqbeujrKa5OLBzZax2UhdP3AN.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\data_reduction_proxy_leveldb\\C3CXXWmNTU.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\\tRaiINlmg9iR1hHHQlTNA0YJai.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000200e145fec00d901 gpscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\data_reduction_proxy_leveldb\\aejiWQp68gTeXqA39WjHFoZqWiBopcx6I7uR2RNBC8Thhl8PLXSEIgP.exe\" O 2>NUL" iAnYaHo8FWs2SAMHukehSvO95.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\AutomaticDestinations\\meu0aZgsrXa1gOVkkwMkbhzWN5YVH8OUbXYlC2muaRTStN.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Office\\Groove\\p2bAcJejOzNs3DYuWN0I9CQXA.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iAnYaHo8FWs2SAMHukehSvO95.exe -
Modifies registry class 12 IoCs
Processes:
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Command Processor ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Public\\Music\\hITqbJBFrNpiiQjRs.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\SOFTWARE\Microsoft\Command Processor ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Projects\\SystemIndex\\Indexer\\CiFiles\\blSuIU0Ikf6CEnFW3UAP2dE02PlGFzbV6rGu8j9Np6nNEif3b0V2ipQlCOW0XZ.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exeAUDIODG.EXEiAnYaHo8FWs2SAMHukehSvO95.exedescription pid process Token: SeBackupPrivilege 1140 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Token: SeRestorePrivilege 1140 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Token: SeShutdownPrivilege 1140 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Token: 33 632 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 632 AUDIODG.EXE Token: 33 632 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 632 AUDIODG.EXE Token: SeDebugPrivilege 968 iAnYaHo8FWs2SAMHukehSvO95.exe Token: SeRestorePrivilege 968 iAnYaHo8FWs2SAMHukehSvO95.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
gpscript.exedescription pid process target process PID 1944 wrote to memory of 968 1944 gpscript.exe iAnYaHo8FWs2SAMHukehSvO95.exe PID 1944 wrote to memory of 968 1944 gpscript.exe iAnYaHo8FWs2SAMHukehSvO95.exe PID 1944 wrote to memory of 968 1944 gpscript.exe iAnYaHo8FWs2SAMHukehSvO95.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe"C:\Users\Admin\AppData\Local\Temp\ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:320
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5601⤵
- Suspicious use of AdjustPrivilegeToken
PID:632
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1484
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1844
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\iAnYaHo8FWs2SAMHukehSvO95.exe"C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\iAnYaHo8FWs2SAMHukehSvO95.exe" 12⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Assistance\Client\1.0\de-DE\BUgneKRyUxjPVdGMVSitMkBGxJaAkco7WOpsai93BHhgg31BXmh.exeFilesize
2.5MB
MD53cdcaec66e3f4533916bef1414238901
SHA1950c628f99173098093f157e6dc9edb40f877f67
SHA25629d8b9b00530e7370d48f8eff5c40e6a6ad267cad704c7f79ab4f7471b24e7c5
SHA51294f5f9c3b3f5047ef6fe5de896ebb151ddbf92fc373488b3ed44b0cb418be0366feaab173fa42f60cc5cc1b07107c3690e6fba9870fa545dc423b388943c51a1
-
C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\tRaiINlmg9iR1hHHQlTNA0YJai.exeFilesize
3.4MB
MD53f13cf9698b54e8b23b088dd5010e3db
SHA11160f7633e5647e5f08a2b009f7137179abcc6de
SHA2569c0e1c096ca56f32d008cbdd770b3684e1a295033488d08c074d879977f7c02c
SHA512171ff021f276dd6eccc94b3f7bd9dd59ffba3325ffb8a14ebdc4e934602f06bc12bf45869fa3196fed395a0096a7518ce48d142a4c269fd2d4b7f151397ef4e4
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\FbeqK8gxqkYlJ0adhBdFYdElMS65I6H3DwikhNqbeujrKa5OLBzZax2UhdP3AN.exeFilesize
2.2MB
MD55fa028ffbf3f2685e60d07c60ba7c295
SHA13efed66970ca99633e2a00045779482093ca00df
SHA2562f7d9eae7eaca744f10c1653dbf339c20f6dc0ae99ad0e5eeec85dc84e4d4643
SHA512e14c697cc416c70dea925e956b38b7a90d96e694b0d336e7def965695e6cddfe854a0168807f576bff3aa488f71ac31198b5c4a58040a4ca998c05e1e89757e7
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\iAnYaHo8FWs2SAMHukehSvO95.exeFilesize
2.9MB
MD5904ea02db6f85791120ab732d3a84c9e
SHA1ccb6aab8e27cba16fcc21fce61fc83ba608473e8
SHA2561c76bee8a78041836070a8c27c6d30d85ade269359222a7c53df45eb01d55687
SHA5122ef3b63b2ac640b5881be95dea76a35748d35473680596b29359092d986ffe70e9b336ef39848fb72be6c7d77e0caa6f570f66ec8fe98a2d33c5c109a6075655
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\iAnYaHo8FWs2SAMHukehSvO95.exeFilesize
2.9MB
MD5904ea02db6f85791120ab732d3a84c9e
SHA1ccb6aab8e27cba16fcc21fce61fc83ba608473e8
SHA2561c76bee8a78041836070a8c27c6d30d85ade269359222a7c53df45eb01d55687
SHA5122ef3b63b2ac640b5881be95dea76a35748d35473680596b29359092d986ffe70e9b336ef39848fb72be6c7d77e0caa6f570f66ec8fe98a2d33c5c109a6075655
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\l1TqC3Ok1u1ddN2AMv7Ih9fu5CMf4DUL6fadGC1.exeFilesize
2.5MB
MD52a522c5acfb32e563cd2ed5ea56fa1a7
SHA1f0e0f1c0bec3217378064d424a071df8e1205e66
SHA25643706d750dd2c0338790eede8461a7f997025b58d1785a020d1bfb74a71afca1
SHA5125af4bb140e0ff18354d69d6f00f208d74455ddfad3e5f6b98cd6df7ddf654520dfa2896bf6071e3a1cc6c6c6801300a14df566d0ca5dc4b28429cfce4baab0ca
-
C:\Users\Admin\AppData\Local\Microsoft\Office\Groove\p2bAcJejOzNs3DYuWN0I9CQXA.exeFilesize
1.9MB
MD56c91f6362b2a222a8b38bb26aca8c806
SHA1d434c5629f0cc0196e26dca2c34b5fd85263b91a
SHA25661dae108aefd4aca7f25ef76d2e6ad4499575a14f3eba3a82f49ab79588982f5
SHA512670093e97d9077420fa6b74c662d62e5a1879c431fc7bbd1d8501bbaa8cb6149f5a58a5ae27bcd2663f84ec10177399bbaa9305018ba6fa22698ae5231a147ad
-
C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\vVeyGfArOEhSl5EwpA4gb7czl7iAe2KfBhLMNtj36YTOdg9eGvFI9mJYt.exeFilesize
3.0MB
MD5447ef85dc91c8f7ac56bb0a0f39239d5
SHA1124d1071d58084f8a6091b224f328eefda6832fa
SHA256325ff49d1a7c059cab811d34544530e088d2cfcaf5056f68d3a29f93e0da38d2
SHA51228fba6ef64f780e02deddce4528bccde8698ee2828f6d96f97a7e6f324797ab8208e33fa468e9d2be5fc95c91638a35b66149bfc6d56cfa1c2757d8469a0d7fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\meu0aZgsrXa1gOVkkwMkbhzWN5YVH8OUbXYlC2muaRTStN.exeFilesize
3.4MB
MD5c429b9292e35523d2c4b5aa9a22b0c31
SHA10701554f3669c787f000acb96b358b249a252d7f
SHA25640e594a8d4bae12c8c4759313159edadb63ead2127bccdba438def5feba7090f
SHA51273c7ca2f80412541d4661c6630a517ea3e49c95708b39a0887721ec6b23705a49751a48e1d6a07e8caf3e5c499347c8672acf264c139d91ab8db99a8897a2b6e
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Recent\EEvsl2gYtfZ4gQjyhJaq65Xoi7A96w3GnsCdcMK1PVtKYdB.exeFilesize
2.9MB
MD5482e7a9b363facf0fb965725e22d7bc9
SHA148a236fc1adeb9f06d3b3f48467c9c0033e7f93a
SHA2560b3b1255feb7a0b148ccb075e2f291b2bdffe7db3bd0deca975edbba9bfd15d3
SHA5120312cb2df6480fb0886a591c663f84e67482cc26cd4e84e6f09709fcdbab52c6ead6f6ce224efee61d2f7495600d39d78a5370f1848f3938639f124b42e9f717
-
\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\iAnYaHo8FWs2SAMHukehSvO95.exeFilesize
2.9MB
MD5904ea02db6f85791120ab732d3a84c9e
SHA1ccb6aab8e27cba16fcc21fce61fc83ba608473e8
SHA2561c76bee8a78041836070a8c27c6d30d85ade269359222a7c53df45eb01d55687
SHA5122ef3b63b2ac640b5881be95dea76a35748d35473680596b29359092d986ffe70e9b336ef39848fb72be6c7d77e0caa6f570f66ec8fe98a2d33c5c109a6075655
-
\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\iAnYaHo8FWs2SAMHukehSvO95.exeFilesize
2.9MB
MD5904ea02db6f85791120ab732d3a84c9e
SHA1ccb6aab8e27cba16fcc21fce61fc83ba608473e8
SHA2561c76bee8a78041836070a8c27c6d30d85ade269359222a7c53df45eb01d55687
SHA5122ef3b63b2ac640b5881be95dea76a35748d35473680596b29359092d986ffe70e9b336ef39848fb72be6c7d77e0caa6f570f66ec8fe98a2d33c5c109a6075655
-
memory/320-55-0x000007FEFC201000-0x000007FEFC203000-memory.dmpFilesize
8KB
-
memory/968-67-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/968-63-0x0000000000000000-mapping.dmp
-
memory/1140-54-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1140-56-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1484-57-0x000007FEFBC01000-0x000007FEFBC03000-memory.dmpFilesize
8KB
-
memory/1944-65-0x0000000000DB0000-0x0000000000DDD000-memory.dmpFilesize
180KB
-
memory/1944-69-0x0000000000DB0000-0x0000000000DDD000-memory.dmpFilesize
180KB
-
memory/1944-68-0x0000000000DB0000-0x0000000000DDD000-memory.dmpFilesize
180KB
-
memory/1944-66-0x0000000000DB0000-0x0000000000DDD000-memory.dmpFilesize
180KB