Analysis
-
max time kernel
68s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:26
Static task
static1
Behavioral task
behavioral1
Sample
73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe
-
Size
1.1MB
-
MD5
9a403a1699c0d385339a52e6f9bcd0b6
-
SHA1
0917e5c0f4b22a73bb35439e5447dedb5f8b06a0
-
SHA256
73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e
-
SHA512
d9db63c2c85b653c269ce78e3e24d3d5dfa10fad6e1a2b53d0e19a88aaa1ed697db1d86c2a3376899a8f7aa9bbbf7fe7ecc9b7a1dd1950192e135f83c352af0d
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
LSQulSw4052L3cOfpCdfxJ8ogMLA.batdescription pid process target process PID 1968 created 580 1968 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat svchost.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
LSQulSw4052L3cOfpCdfxJ8ogMLA.bat73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows NT\\MSFax\\Common Coverpages\\en-US\\WS9eKXPK1sYA0wlBnafKZzFihlXhgzAi1X8pCAs43RLZeaYintUUGZQj6kNBhG70tD.exe\" O" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\xMsCoVb4DkjHm0Fpf.exe\" O" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Vault\\EVHOyVvnUfqDYl.exe\" O" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\ThirdPartyModuleList64\\mdCz6ENLtrlgIHQpIyZtFTzU4qN1BZn5CR.exe\" O" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run LSQulSw4052L3cOfpCdfxJ8ogMLA.bat -
Executes dropped EXE 2 IoCs
Processes:
LSQulSw4052L3cOfpCdfxJ8ogMLA.batLSQulSw4052L3cOfpCdfxJ8ogMLA.batpid process 1968 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat 1500 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
LSQulSw4052L3cOfpCdfxJ8ogMLA.batLSQulSw4052L3cOfpCdfxJ8ogMLA.batdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe LSQulSw4052L3cOfpCdfxJ8ogMLA.bat -
Loads dropped DLL 3 IoCs
Processes:
gpscript.exeLSQulSw4052L3cOfpCdfxJ8ogMLA.batpid process 704 gpscript.exe 704 gpscript.exe 1968 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 59 IoCs
Processes:
73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exeLSQulSw4052L3cOfpCdfxJ8ogMLA.batgpscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Media Player\\Sync Playlists\\en-US\\lr29jyKj.exe\" O" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\Favorites\\Microsoft Websites\\1K1BblBt4JNgP5cJ7CKuU2hRfmJcx.exe\" O" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\51\\bw62Ey1NcuE9qcGDlE25dl4RUHZ4LkjIyUKPAaqL0ZXxKZ.exe\" O" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Projects\\SystemIndex\\Indexer\\CiFiles\\xzr9TzyA8iZoMaBwrrgkPVBdN.exe\" O" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000106b99e3ea00d901 gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Java\\XdreJvT9pcc.exe\" O 2>NUL" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\\Zedb3hbfu5mNts.exe\" O" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000b04001f7ea00d901 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\.DEFAULT 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Adobe\\Acrobat\\9.0\\sifY5MjQQQWiHo1MJlADQ5hQYfZugwBCvxLLiaffSymEebAKje9FaO07Yekej.exe\" O 2>NUL" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-738 = "Start Internet Explorer without ActiveX controls or browser extensions." LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Projects\\SystemIndex\\SecStore\\vkgwAreSR2JJsJlzz95x2QxXne4ODWQEltaxXKbnZPlTfxu4RYC50CLRm.exe\" O 2>NUL" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Assistance\\Client\\XnrtxuM06fTNM2Qq.exe\" O 2>NUL" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\MEIPreload\\lY3qSEBez8r3rSPdPIaNmk7djHPrvRFCz0Z6M26X8hdCXl8V3.exe\" O 2>NUL" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\e9Q3x62TQDxr60dMfVGFLO5Zq3wNMetw09.exe\" O 2>NUL" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached gpscript.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%systemroot%\system32\windowspowershell\v1.0\powershell.exe",-111 = "Performs object-based (command-line) functions" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\33\\17PlG7saxZZ3oY9cSciio3qQI4jT05ueaJyxa2LaD12A4tvZFW.exe\" O" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\\packages\\pLJIrCGOz1PPJtQl2oYrEFrs5RTCmq5uI96DGvfH31pvwzv8sJ.exe\" O" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\8by27av1.default-release\\storage\\permanent\\chrome\\O0LRwgrjAKcMlgSs8AJsd4158eNsEYj.exe\" O 2>NUL" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\0\\c1ihbduPslqzXWpG8L7cxyYKOQE0GOjSF3NKIqfL5Vp66X2FBBQ1ftp9zJwx.exe\" O" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows NT\\MSFax\\VirtualInbox\\aEwHSFgdaEEGJ81qTsHG5oP1.exe\" O" LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Network\\vI74YtgASSJEOpLEBUZHQhMtb4Mqh5Wk4.exe\" O 2>NUL" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\KrvaIhgjddgnw5wgbqGkuCPHIhF60tLevogQt94kUSJ3DHscf2i5MCtzY7EklgF8yQgMT.exe\" O 2>NUL" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Key created \REGISTRY\USER\S-1-5-19 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe -
Modifies registry class 12 IoCs
Processes:
73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\LlIpasHo9IHlK5tMAPV1GVS7W3rg8mfFBqUy2OR4Aqs.exe\" O" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\SOFTWARE\Microsoft\Command Processor 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Feeds Cache\\cnhfbsKQWH6CdLHiZPK8iFtQAfOk8dM3d55E1gckrLr2CePMiDZSK6i1hCu8w6EkYiSIQz.exe\" O 2>NUL" 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Command Processor 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
LSQulSw4052L3cOfpCdfxJ8ogMLA.batpid process 1500 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat 1500 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exeAUDIODG.EXELSQulSw4052L3cOfpCdfxJ8ogMLA.batLSQulSw4052L3cOfpCdfxJ8ogMLA.batdescription pid process Token: SeBackupPrivilege 1620 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Token: SeRestorePrivilege 1620 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Token: SeShutdownPrivilege 1620 73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe Token: 33 2044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2044 AUDIODG.EXE Token: 33 2044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2044 AUDIODG.EXE Token: SeDebugPrivilege 1968 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Token: SeRestorePrivilege 1968 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Token: SeDebugPrivilege 1500 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat Token: SeRestorePrivilege 1500 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
gpscript.exeLSQulSw4052L3cOfpCdfxJ8ogMLA.batdescription pid process target process PID 704 wrote to memory of 1968 704 gpscript.exe LSQulSw4052L3cOfpCdfxJ8ogMLA.bat PID 704 wrote to memory of 1968 704 gpscript.exe LSQulSw4052L3cOfpCdfxJ8ogMLA.bat PID 704 wrote to memory of 1968 704 gpscript.exe LSQulSw4052L3cOfpCdfxJ8ogMLA.bat PID 1968 wrote to memory of 1500 1968 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat LSQulSw4052L3cOfpCdfxJ8ogMLA.bat PID 1968 wrote to memory of 1500 1968 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat LSQulSw4052L3cOfpCdfxJ8ogMLA.bat PID 1968 wrote to memory of 1500 1968 LSQulSw4052L3cOfpCdfxJ8ogMLA.bat LSQulSw4052L3cOfpCdfxJ8ogMLA.bat
Processes
-
C:\Users\Admin\AppData\Local\Temp\73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe"C:\Users\Admin\AppData\Local\Temp\73826a30c843d893db56ab17e297b23440289724c83b90ee0c36bd74ff86e75e.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:580
-
C:\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.bat"C:\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.bat" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1748
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1076
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:704 -
C:\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.bat"C:\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.bat" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\MSDN\qxrMRchK47gVko6AL63FzPUqltU.batFilesize
1.6MB
MD5792654a8f946f2b7503ca17ab4cafc48
SHA17e5ca28fe5e8bcc11fedf9bf6b057f5c8b30a58a
SHA2569e009bbb50b4c6ad08af3d3bdf5db5e7b4cda62a8a6ae78814d93adefd101186
SHA512a7bc6812c315b8d695dc7af2080c24d9b8ba6b1ef47e8c62fe2d21c07d8ccde085274793c625c4703a1ab16c40cafef5c3b86bf07fc728479a7c7d13de30ee14
-
C:\ProgramData\Microsoft\Network\vI74YtgASSJEOpLEBUZHQhMtb4Mqh5Wk4.exeFilesize
1.8MB
MD5e3aa8c870ec3b40234a9f319ab760348
SHA14eaad1f77afafc0306888237ad42c1c1c6ee921b
SHA256b962b0ed62f6ef9ffa11b5c51909a07a6e9e724801c9b2e0bbc793cb072bed23
SHA51249546e75a6a97a5a1db0bf4a4796d2e41c7c2149ee0c226b310bc43e23aa00fabda2afb9b288f593742e755cbc11ed30a672c8285f3aafc07590e4e7e2c78ad5
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\xzr9TzyA8iZoMaBwrrgkPVBdN.exeFilesize
1.5MB
MD5e58e1b6bbe9c63b3fac21b5384267ccb
SHA13adb50151adfcd24c79ef7115c78d6ab9fda7c85
SHA256c75a9c93b62f4c625afab34e11816f5358e9bb79cbe9df8fccf3151cb2379b97
SHA512c1085eaf3b2c66687299a7e18c93abc9f2c4e4d36d603b2e05ae52e483fbccd27764f13cda77aa8a6e62b22a46959eb5ece29ea01471ece1f5721c46a8f920a8
-
C:\ProgramData\Microsoft\Vault\EVHOyVvnUfqDYl.exeFilesize
1.4MB
MD54bf7890f23c3c69a018c448f26ac50f0
SHA18d032dd65ffaeb98c673cd550fe3fe8e840e8312
SHA256d2dacb7329dc3d603daacd338d4ad928b293e32aca3f678156131791a684140d
SHA512f5152125f249eac6f3484bda80dd0ae648df37ad2634bfd966477d7b4e0cd6e4ab7b8466bafec10b8c2ea589709172c3e573b8da8dbf0e672a44965a6907d458
-
C:\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.batFilesize
1.3MB
MD587feedb3cae8c5bba0ce837900ab9605
SHA155fc4654b519aee20559be2a50549ebb2e753c9a
SHA25607931ae380eebdc29349e1ab977dd130b6094393306bede6efeb601e7d14dd95
SHA512e5b57f5a1f000033cd360e92b82a7a282b53bca9d516ebdb7fa90b041ba13630f690ae6ca37a9a898ca52efe0a039e95461d818fdd6dce651ff6a00640cd438d
-
C:\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.batFilesize
1.3MB
MD587feedb3cae8c5bba0ce837900ab9605
SHA155fc4654b519aee20559be2a50549ebb2e753c9a
SHA25607931ae380eebdc29349e1ab977dd130b6094393306bede6efeb601e7d14dd95
SHA512e5b57f5a1f000033cd360e92b82a7a282b53bca9d516ebdb7fa90b041ba13630f690ae6ca37a9a898ca52efe0a039e95461d818fdd6dce651ff6a00640cd438d
-
C:\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.batFilesize
1.3MB
MD587feedb3cae8c5bba0ce837900ab9605
SHA155fc4654b519aee20559be2a50549ebb2e753c9a
SHA25607931ae380eebdc29349e1ab977dd130b6094393306bede6efeb601e7d14dd95
SHA512e5b57f5a1f000033cd360e92b82a7a282b53bca9d516ebdb7fa90b041ba13630f690ae6ca37a9a898ca52efe0a039e95461d818fdd6dce651ff6a00640cd438d
-
C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\packages\pLJIrCGOz1PPJtQl2oYrEFrs5RTCmq5uI96DGvfH31pvwzv8sJ.exeFilesize
1.5MB
MD5a7db0f4e3f9dc48cda9476b8b88dceaa
SHA15bda60d315a166e399bc44566bbaf05c690077f1
SHA25669c2422e7df8659c60c9000f8f73c26584afa6af585d9f010aa89d7944575c4f
SHA51292d12f9b6df673991c2326a5be3e5cd85ab9a8eba5b55fcd958d7dd0d4bf4bfe83ca926b92f7321f929f3ae27e1ef05e15797e60afadc41bedbf9bcae2dbe832
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\17PlG7saxZZ3oY9cSciio3qQI4jT05ueaJyxa2LaD12A4tvZFW.exeFilesize
1.9MB
MD5f339410981a39644c5526397e1b3a3a0
SHA18aaf0c86a4ded19839b858739656ddc0850090c3
SHA2566fe1cccbdc8536aaf280d122430b3385187d0c402849409f700399e0b879684f
SHA5129ca7dee73f617c37b2dcd97163a6a84952e9f7bb268a5e4416ed265c34fc5902a4d2ce3e94f4fb1694b22e20d9ee2ef187aadd3112c266c3b6f4b0e05cc1dad3
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Tracking Protection\mQGZHMw0Bqqv5Fyv0lqtFKXLbL8osl7Zosvw3N0SH9Q2.exeFilesize
1.9MB
MD565f8bfc8a64ab99f6f5cc015da79019c
SHA15cd3401a94f7d2b0825071872f0da3a2c32efb76
SHA25628bd8f3a5fdcbe63d51b165c2f14a64227c1fef1765c88e3dba64cdf0c5038a4
SHA51201ab32bbf894b68d05f285a672e982ceb937e5073de873f7efaed3935b07fe569f94264f9a6a70bb7a886d86cc8dd84cd98f2e87531039a84ca49ff88f80a82e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XB6YKGN8\ZUXKhMFkU0mYdTv8Pb2xTpGQ.exeFilesize
1.5MB
MD5445cee7355c9543d196ec28ff363ef47
SHA177354e511e8dc8c18f6154be53080bf1865427a7
SHA25693b86d7af5d8208d5ddfb160926888da785ec757597b7e877218d6759604ae84
SHA51228f6905ef992ef4238a44e60ee491dd21b84ebbe8b89f748e2f1c7044eb05a0c77f85308229761eb81e1b72c7b54ad89c96381e10c0378c93f1f4747da73a364
-
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\e9Q3x62TQDxr60dMfVGFLO5Zq3wNMetw09.exeFilesize
1.4MB
MD592eb02a841a9bf50baea9e0a8be96c64
SHA178194a83d73f5f3d5f333501f0bdd0099941d608
SHA2568bed71a900d5af070a06f6cff8b62f284a4a91cf2f0069847bd6247a914aca0d
SHA512d4b99d056f42f253d6facd54d6e7f6bea982d04902ad537e7c908546f3f3c2f2c52cff8dd5d4fd0776c8d000e9a4e6edae23a92c61d7d7f81005cb15c4bd1c9c
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\KrvaIhgjddgnw5wgbqGkuCPHIhF60tLevogQt94kUSJ3DHscf2i5MCtzY7EklgF8yQgMT.exeFilesize
1.4MB
MD5ea5f9ddd78689513fe862c8c9978051a
SHA1497e7f5c352af7893dd50872a097f267972ab188
SHA2561aa247d77e073b832fde067490e2ae044e30818b0a771703b34615d139ecf8f2
SHA512ed9fc95838a3259dcaff9578f09aaf523da5dbed0e9bfefc6e362910b36bd86e42c15f1fc293df6453d44b9760cb8c1e3252c24e2b75e3a40c8564413061cc58
-
\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.batFilesize
1.3MB
MD587feedb3cae8c5bba0ce837900ab9605
SHA155fc4654b519aee20559be2a50549ebb2e753c9a
SHA25607931ae380eebdc29349e1ab977dd130b6094393306bede6efeb601e7d14dd95
SHA512e5b57f5a1f000033cd360e92b82a7a282b53bca9d516ebdb7fa90b041ba13630f690ae6ca37a9a898ca52efe0a039e95461d818fdd6dce651ff6a00640cd438d
-
\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.batFilesize
1.3MB
MD587feedb3cae8c5bba0ce837900ab9605
SHA155fc4654b519aee20559be2a50549ebb2e753c9a
SHA25607931ae380eebdc29349e1ab977dd130b6094393306bede6efeb601e7d14dd95
SHA512e5b57f5a1f000033cd360e92b82a7a282b53bca9d516ebdb7fa90b041ba13630f690ae6ca37a9a898ca52efe0a039e95461d818fdd6dce651ff6a00640cd438d
-
\ProgramData\Microsoft\Windows\LSQulSw4052L3cOfpCdfxJ8ogMLA.batFilesize
1.3MB
MD587feedb3cae8c5bba0ce837900ab9605
SHA155fc4654b519aee20559be2a50549ebb2e753c9a
SHA25607931ae380eebdc29349e1ab977dd130b6094393306bede6efeb601e7d14dd95
SHA512e5b57f5a1f000033cd360e92b82a7a282b53bca9d516ebdb7fa90b041ba13630f690ae6ca37a9a898ca52efe0a039e95461d818fdd6dce651ff6a00640cd438d
-
memory/704-69-0x0000000000C20000-0x0000000000C4D000-memory.dmpFilesize
180KB
-
memory/704-68-0x0000000000C20000-0x0000000000C4D000-memory.dmpFilesize
180KB
-
memory/704-76-0x0000000000C20000-0x0000000000C4D000-memory.dmpFilesize
180KB
-
memory/704-77-0x0000000000C20000-0x0000000000C4D000-memory.dmpFilesize
180KB
-
memory/1500-85-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1500-80-0x0000000000000000-mapping.dmp
-
memory/1620-54-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1620-56-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1748-55-0x000007FEFC161000-0x000007FEFC163000-memory.dmpFilesize
8KB
-
memory/1968-70-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1968-82-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1968-78-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1968-62-0x0000000000000000-mapping.dmp