Analysis
-
max time kernel
34s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe
-
Size
1.8MB
-
MD5
ef9899724839613d026e95cb1a7fd60a
-
SHA1
b4325c37c26b27bbc1cba63e413c6ddf56e7f083
-
SHA256
ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01
-
SHA512
5fe426c2f5e07678150936975415df1276e64203505bfb680d429834896b0ced4c1c09b51533b91acec0a31d86a345732b625ee40bb60c8acb6b5fbd787e083d
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3616 created 672 3616 Z4mahmvhWb.exe 1 -
Adds policy Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\Downloads\\rV2UYt5BbDlFQBs0W.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\ContentManagementSDK\\Creatives\\353698\\QPAzSV07zTpUM9tV17u6hrxEc4Fv4E6UEUWJSMFwcqGQahBTWTZqXrDN0P.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Storage\\ext\\gfdkimpbcpahaombhbimeihdjnejgicl\\def\\Code Cache\\js\\index-dir\\lpdIBaHawPvIbiwTw1m4uTjckJI5gGpELw0GFkRBZNmrsSyqM1b6HVMGZVHhgYm9WGmYfR.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Z4mahmvhWb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\SystemAppData\\L4jpH0u75U2PkFBNqe7vyy73bLH78SukUIKpmzMYxaQlZ6D6m8t1XLpM4sx9qmlxl.exe\" O" Z4mahmvhWb.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe -
Executes dropped EXE 2 IoCs
pid Process 3616 Z4mahmvhWb.exe 2128 Z4mahmvhWb.exe -
Sets file execution options in registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe Z4mahmvhWb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " Z4mahmvhWb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe Z4mahmvhWb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " Z4mahmvhWb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe Z4mahmvhWb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " Z4mahmvhWb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe Z4mahmvhWb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " Z4mahmvhWb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\Templates\\qAqCuwo3cFmzp2PpvUteXF44UHAmv.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\D0P3Q1MwF9f11eTRRR9hHbNqRgJ5OosUXPjwASyGcDNDnC8y6Kj737.exe\" O" Z4mahmvhWb.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\pxm2sYQgJFZGXfLyEOqLHCxJ2reso08OZ99hagCkbcdpKu89cKeRh.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows NT\\MSFax\\VirtualInbox\\en-US\\tA7DB24hqV4nyLZRIXXQ3rXuutM9PTUyxqxCjxMFNflB8x844gyMnNTfJyAc0Ih.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\39\\G09opaswQRCFDpSUTLW7IQb7G8r43NpdtulxlJA31E1lXzh9WZ8HIyRLXg.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "223" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached Z4mahmvhWb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Vault\\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\\tpPAbyKgUpFuZ5Bm.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\INetCache\\Content.Word\\kiEIT7EoBItEP4kgKsquuaqp0Z5aKn6O.exe\" O" Z4mahmvhWb.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\wfp\\BZt5jDzT7Zz6F99AWpy3S0.exe\" O 2>NUL" Z4mahmvhWb.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Windows.CBSPreview_cw5n1h2txyewy\\AC\\INetCache\\1dD8z5goXzhBKqOvGcyZvjc1U63dz5aBGWpLtHTbCuqQd3.exe\" O 2>NUL" Z4mahmvhWb.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Oracle\\0lRtbtZfR9V5DvtiAaWPi9y3cQcZ34rcPFqFIWqw.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Z4mahmvhWb.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\AppRepository\\Packages\\Microsoft.Windows.SecureAssessmentBrowser_10.0.19041.1023_neutral_neutral_cw5n1h2txyewy\\fIWZhgcVkLT33qrXqxHg104CJZbPf3CMNPAeZNaxXwrijW9EPwJ8XE70knkDQ.exe\" O" Z4mahmvhWb.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Z4mahmvhWb.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\sr-Latn-RS\\UlhrLc23tHgEP4zibLQIvYFqjJ3FRl4AN3DZnR6pXnBOuIciulRHisNSnW.exe\" O 2>NUL" Z4mahmvhWb.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{4234D49B-0245-4DF3-B780-3893943456E1} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 010000000000000030f178a5e300d901 Z4mahmvhWb.exe Key created \REGISTRY\USER\S-1-5-19 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor Z4mahmvhWb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.CredDialogHost_cw5n1h2txyewy\\LocalState\\mtBSsWcNLBZTpPfFm5yJ36xwv9GEjb9XIDA2lkJVzfWSjzbtv7gyyAXQhLT4MDDI8u5BVJ.exe\" O 2>NUL" Z4mahmvhWb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Windows PowerShell\\Re4IESOjs0blWuhWWh97qCWjdzfJGdb5ONUyMVfZx.exe\" O 2>NUL" Z4mahmvhWb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}v12.0.40660\\packages\\vcRuntimeMinimum_x86\\Aua9Kwm69tt2bb4YNnqUUw9WpxViE290kJ9UCqukPBFuFvoR1k2n.exe\" O" Z4mahmvhWb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\or-IN\\bDnKLNK9RWEF.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\\AC\\INetHistory\\aBRQO69eeNr3jRx.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Command Processor ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\10\\kJ86F69SSDB02KLjFUyY.exe\" O" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\Parental Controls\\RZVJIcw2tARnnybuEMGeuuJLvm6XXcoML43DIGF.exe\" O 2>NUL" ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 Z4mahmvhWb.exe 2128 Z4mahmvhWb.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 2548 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Token: SeRestorePrivilege 2548 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Token: SeShutdownPrivilege 2548 ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe Token: SeDebugPrivilege 3616 Z4mahmvhWb.exe Token: SeRestorePrivilege 3616 Z4mahmvhWb.exe Token: SeDebugPrivilege 2128 Z4mahmvhWb.exe Token: SeRestorePrivilege 2128 Z4mahmvhWb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2276 LogonUI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3616 1264 gpscript.exe 85 PID 1264 wrote to memory of 3616 1264 gpscript.exe 85 PID 3616 wrote to memory of 2128 3616 Z4mahmvhWb.exe 90 PID 3616 wrote to memory of 2128 3616 Z4mahmvhWb.exe 90
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\Z4mahmvhWb.exe"C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\Z4mahmvhWb.exe" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe"C:\Users\Admin\AppData\Local\Temp\ae5894c9cbb4f058f8aa40da8deebc44fb9772ab645a3df5d62cb23e8ef76d01.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3989055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2276
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\Z4mahmvhWb.exe"C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\Z4mahmvhWb.exe" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows NT\MSFax\VirtualInbox\en-US\tA7DB24hqV4nyLZRIXXQ3rXuutM9PTUyxqxCjxMFNflB8x844gyMnNTfJyAc0Ih.exe
Filesize1.8MB
MD5d60991f7a9bbf8ad56affd18149460d6
SHA1c999a1d843d12becb423ed2016dc5db9fb24293c
SHA256143df253d3648d9ca01b7e62cdd51f95cd964228eaa47e640810414c2a714706
SHA5123b52468f4b0a165672dca6affa6bd6dd5e123a575666b7e553c64b9c57eb05aa6f772ed69b0acdd8e1e59004ebc763731d38464f9e0179f0142a9abfe021a7eb
-
Filesize
2.9MB
MD5e1eb1a69fd741d0e5557faeb8a0b1f07
SHA17b36101532bfaee12a78cb85972c23976041379a
SHA2565b092aad9d19168402b5ff2f75050147d36749b21e4f8c8e59be6d1ebfdfd353
SHA5128a2d738242016262404ed91c2eee3e94a2adf71a955218cec7214c54348c0210c6efd14d067473bc61e818babc236eb632c3b574b6ca539ca013d3242635a4ee
-
Filesize
2.0MB
MD5f7e27c4379dc099f3fdba99b0ae52741
SHA192c94803eb9932fc5e1acc3a5b6d9756dafab585
SHA2565c7bfe063ec66b2d51bd99100c6f391c13270179b1b94e5d1353a5bfe45f13fe
SHA5126495d230e1f6e987c38125f9e8ee15240eccdf8bc822c1b5adc860a3bb20dbc3cc8fdac44c74ab25866db6a083f128fbcb386433554a67ca086a1aa6fd2ebb89
-
Filesize
2.0MB
MD5f7e27c4379dc099f3fdba99b0ae52741
SHA192c94803eb9932fc5e1acc3a5b6d9756dafab585
SHA2565c7bfe063ec66b2d51bd99100c6f391c13270179b1b94e5d1353a5bfe45f13fe
SHA5126495d230e1f6e987c38125f9e8ee15240eccdf8bc822c1b5adc860a3bb20dbc3cc8fdac44c74ab25866db6a083f128fbcb386433554a67ca086a1aa6fd2ebb89
-
Filesize
2.0MB
MD5f7e27c4379dc099f3fdba99b0ae52741
SHA192c94803eb9932fc5e1acc3a5b6d9756dafab585
SHA2565c7bfe063ec66b2d51bd99100c6f391c13270179b1b94e5d1353a5bfe45f13fe
SHA5126495d230e1f6e987c38125f9e8ee15240eccdf8bc822c1b5adc860a3bb20dbc3cc8fdac44c74ab25866db6a083f128fbcb386433554a67ca086a1aa6fd2ebb89
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\39\G09opaswQRCFDpSUTLW7IQb7G8r43NpdtulxlJA31E1lXzh9WZ8HIyRLXg.exe
Filesize2.0MB
MD55fbc5870719a575859c0784a5cac324f
SHA12d6f4248a407f5971ac8c99dca0ddeceb6216047
SHA2566b802892b68b9846f674d8481055244b831082f1ba204f07ee2fe892fee4bb86
SHA5124751712af204250538b50fb0dd10e6fc80a7b9f600568347935654fbc8b58635e6d7b9e02f941cb2a15c3bb0e9ca297af9202de28edc6e9e36b907f01ad8ea78
-
Filesize
2.4MB
MD5e902ff2be6b4a1b6810997107d825333
SHA15b33e96ff6e40db2f27a88864fcdd7548acb1246
SHA256ae52d7ac862858539183c7b62271222e3a8631d27f77b8dfbe2c56d1fc8224d4
SHA5122c264f73765457d6aa6d92396ba6d85291a7ceedd480acf4856c2c2f3566defa4afbe390f589b69dba69c67b7fd77b1e2a8d27fde24d9ec92c8f48fa457d58c3
-
C:\Users\Admin\AppData\Local\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\tpPAbyKgUpFuZ5Bm.exe
Filesize3.3MB
MD52b3e9f765c394f546a4ac1e4f7928ca1
SHA1cc0d5ff52e87b2f8750e6556bce5942bf04d9c1c
SHA2569e703cb5aabfa04335403181647b691c8ad20e372e8464d4840edd98f0d03b9b
SHA512c3869ecad8e82717280ebba49fbf26f4e00e797604a6e7dafa7a4c6aa505734c20c2aea0fabf64c6fccefc42f15a032da3cd89b9bd4cbd96f0d1c33aea0d7790
-
Filesize
2.7MB
MD52a34c08614dcc45366377e73506ae583
SHA1bf5b0c4278c7b01f72705f2d23bebfab79c98307
SHA25645c044a044867222dfc3f8e07557348ae77c2411e97a01cb79899c73fadc2650
SHA512362f251dc21479c6db3b14b41843d9518bd8baeab365263ca13bd825d4c44fa7b10856f408dfb7058cdf0a8913568ce7f4953f4572f1ba980c8eb5cd2e79a665
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Win32WebViewHost_cw5n1h2txyewy\SystemAppData\DN8Jfx8PE6yQfbHX.cmd
Filesize2.6MB
MD52f84d138976fe8c7a06cd3e47cdd0ab1
SHA1482a14b41ec80e4bf7940377cb2fefefdb2dd557
SHA256f463f94af4a833a088f9d497ef5fe45b9ddbe345ba9dc3000fbe2d5e390abf85
SHA5127bfac86db0eaad14e2c8abcc713fe8ab0bab5e5fb68a7644f0a35c2ba64f68d5f93854bf7bae91e04bc56a59d6d2b66ca383a70e2a0ee8b9ce4d8b69363abc4c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\353698\QPAzSV07zTpUM9tV17u6hrxEc4Fv4E6UEUWJSMFwcqGQahBTWTZqXrDN0P.exe
Filesize2.8MB
MD553b049a9063a4c834f432f6948fb9daf
SHA1c93e9a9e5a23786bf0310c617d7873db4ed2687a
SHA25623c23f036f8305db66af205324d395746a6944117e2836f1c90596575ac31123
SHA512c33c88de6760b0a79132f10e743e762ff5d01dda0ce39f4e94e4933f975470aeefe237b74a4cc5dd16b328db9ca29f9d7abb6cfebdb3f905504c9fe505b04cbc
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.UndockedDevKit_cw5n1h2txyewy\AC\INetHistory\aBRQO69eeNr3jRx.exe
Filesize2.3MB
MD54cf861ad4acf6853fec1a3e1086319ff
SHA1ec13869a2cdfb8e57e72b7955ca8ec165d044823
SHA256a52a9f2e00f94b32faedbc73ef83a360de0745f7b314808f9e33d104b93f86c8
SHA512cfa4965a6b7def9462c5df48a353ac990fe76a651ccab62ab8f1bd74bd219db427725beada99a2c7b914101d1862130ee6e2ddce04d66f308e07f707a892205a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\pxm2sYQgJFZGXfLyEOqLHCxJ2reso08OZ99hagCkbcdpKu89cKeRh.exe
Filesize3.3MB
MD5c39106fbdef9f96ff99472c91f0a9cf8
SHA181b46c6f0323930d53cd3d0da55a4f5d42f0dc0f
SHA256018f55ec07d944cc7604768e63e6485f70174e269627a22b1bd243bb47627f7e
SHA51254eb81d9331ad62b721665b85040f31011258203a1676304b0821604ea876b03a75786398de25003ca5a407a81057d3168b7066a17864fa673e1e564258687cb