Analysis
-
max time kernel
182s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:29
Static task
static1
Behavioral task
behavioral1
Sample
d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe
Resource
win10v2004-20221111-en
General
-
Target
d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe
-
Size
619KB
-
MD5
1f61487ea788c82aaaf84f58459275e3
-
SHA1
651f788ada298e9d87bcd044325465af0f6ccc0e
-
SHA256
d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d
-
SHA512
848b0c99fe14e7968c8b7724d31412c1303690b69bb93b8036cf72ebfd9b65ef9b19ee7f61640295fd8b4b77dedda81f67c57c0b032d501e2eb220901428ecbf
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exeh8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\UEV\\FHciK4cInd0aOfMueS.exe\" O" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\\q0I19XwRKvfRqKNzwEM.exe\" O" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\ContentManagementSDK\\gTLUyYn6ndj.exe\" O" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.CallingShellApp_cw5n1h2txyewy\\RoamingState\\8HYqv9YfL98gZn3TcfB1wPky0p6NBq0KAkxJQZnM0r.exe\" O" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe -
Executes dropped EXE 1 IoCs
Processes:
h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exepid process 3464 h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exeLogonUI.exegpscript.exeh8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\\LocalState\\QNIdBMj2sbWogvq.exe\" O 2>NUL" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\adm\\de\\y36pFB9OZpu8WAx6QCYrsVuLWag3Puh0tjr7vlbTzKdI9X.exe\" O" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Feeds Cache\\E0NuJ9EA7YuhBT5vm6mbkQv30RpGKV86.exe\" O" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\History\\cFtpzeQfyQYbCS3KfByampPtw4Wk8wS7uqOxse7qxshJvv8olNIBSNxoRecSA4wfAH3.exe\" O 2>NUL" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\\AC\\INetHistory\\Kiakq6UXZBegLgTDSs0pTAHosOb4zysM3P2G0uN1BkYzM8.exe\" O 2>NUL" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\AC\\AppCache\\RSJZI66J\\29\\RwKEpOZQL0d3.exe\" O" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\32\\AQZuvLK7mWTXMuadbrIhx9c3A2pZtTHhHhNaoidPUA76y6L7vcELu.exe\" O" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Publishers\\6ribC6fC3h3bpn2NX6rYybmx37D9LkqsvfaxxmcX8BoSvm4HTesMDhls.exe\" O 2>NUL" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\40\\4YP9JageKJfbsspdlm9goPxnTlvJXVX3pPq3lRYAhJUZH3canAfEXn0rAtb3pKCugL3.exe\" O 2>NUL" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\AC\\TokenBroker\\Ac238UYKm.exe\" O 2>NUL" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "240" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\sq\\eZLdq53N0gtZXFa7CVdV8vXbqSwPnAqQ4BbuoRT4Oi1l4kyltd73fHPggsvLbxXOzQrqy9.exe\" O" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Burn\\Burn2\\VMWxY1z2T72qVarM8Cz3dLbm8P4vTPNv3FcFckLsFTIeITc8XWSLTWJDzoG.exe\" O" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\S-1-5-19 d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-20 d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\qXnw6Wrk3MaaqWDaSYoBqO1lXaejCcHDagyFt8ln3n20n85UwsB53Kx9tQB4.exe\" O 2>NUL" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{4234D49B-0245-4DF3-B780-3893943456E1} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 01000000000000003ca4748beb00d901 h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Pending Pings\\9YNVsq7qLIxn4dtQvsDuzyVIgNq220qDVlvx45.exe\" O 2>NUL" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\3D Objects\\MZvj6r0dkdPa.exe\" O" h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Oracle\\Java\\jdk1.8.0_66_x64\\tOe3kOzyzFDkgSYkbqtiRguAKuwdJAqDpVqdTwj9ssopFn94TFhowTxF0n39EtEYm5.exe\" O" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\\AC\\INetHistory\\7XavigvAOoof44Eq9Z1mgudpKoAcyyoN98qaQRt6o1GarYrdtLEWQ9ORd0vgDV9BOOxf.exe\" O 2>NUL" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\.DEFAULT d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe -
Modifies registry class 10 IoCs
Processes:
d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\NcsiUwpApp_8wekyb3d8bbwe\\AC\\INetCookies\\UoGPIhA2Ozk8F2jJ7ChfmcaJdHIABiZMqeJcXi.exe\" O 2>NUL" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Command Processor d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Device Stage\\Task\\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\\it-IT\\1Dhe7YddqYQAL6TFvpHZjs8gQQ5.exe\" O" d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exeh8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exedescription pid process Token: SeBackupPrivilege 3712 d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Token: SeRestorePrivilege 3712 d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Token: SeShutdownPrivilege 3712 d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe Token: SeDebugPrivilege 3464 h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe Token: SeRestorePrivilege 3464 h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 3736 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
gpscript.exedescription pid process target process PID 1048 wrote to memory of 3464 1048 gpscript.exe h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe PID 1048 wrote to memory of 3464 1048 gpscript.exe h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe"C:\Users\Admin\AppData\Local\Temp\d46464f731ac4599b9a99da04648ff627b8938c26c455fe2943ca3384dfc616d.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39e7855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe"C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exe" 12⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jdk1.8.0_66_x64\tOe3kOzyzFDkgSYkbqtiRguAKuwdJAqDpVqdTwj9ssopFn94TFhowTxF0n39EtEYm5.exeFilesize
691KB
MD5b59f5b3b7763fe77ba73c97218e2e577
SHA1a92a7917423f13b2e78f43c3e150047f782634f9
SHA2564de7e244d48cad3d24ed90e265329f3707c9bf0f49ff623abafb619361832064
SHA512736c223db41b82811fedd18c3be54b929bafe6c84a0e24eb775090d976104662403ef910953cf6d8b0a9ad4d0be4a6adcd74443f5c8376bb4eeaaaa99d4680fe
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\AQZuvLK7mWTXMuadbrIhx9c3A2pZtTHhHhNaoidPUA76y6L7vcELu.exeFilesize
837KB
MD59e268633a74781961f1e9fd77547d529
SHA1ab1e547584aa8cda0af93d89670c83b68a9d0f0a
SHA2561428ce638f59af3826bcd2771a1d196f587b41abb66e1319cae22cd854d669df
SHA5126ac92f1df67d4fb1ea259447e1d644abc2858df3d6cccbb5fb49dec3b4b347df60b3cc792195cd257746e330576ced43ea1f0ead9538c240e0c586250768d50f
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exeFilesize
969KB
MD5f593f8376aecaaf8372b8a4edb7c8211
SHA15fc458f96e1c3c1039de095b69b057a941314c2f
SHA25651142e9b6e6b05dbe6221c618d87b448cda475d5b7362461dd95c976b22f8725
SHA512287a5138675b6f922d5edabc744cadcbaad7d9684b0ac104157c1344c637f91deac59faaba9b760eaf15aada1781d5cd46c8dbb7445eb80af06579edaaaa2a33
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\h8MzYicWOgrgDSYOP9BFlvgo5rt2EkOddCFYOlpWqyi1FfVUxZVcRAaO5WhwSc3U.exeFilesize
969KB
MD5f593f8376aecaaf8372b8a4edb7c8211
SHA15fc458f96e1c3c1039de095b69b057a941314c2f
SHA25651142e9b6e6b05dbe6221c618d87b448cda475d5b7362461dd95c976b22f8725
SHA512287a5138675b6f922d5edabc744cadcbaad7d9684b0ac104157c1344c637f91deac59faaba9b760eaf15aada1781d5cd46c8dbb7445eb80af06579edaaaa2a33
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\sq\eZLdq53N0gtZXFa7CVdV8vXbqSwPnAqQ4BbuoRT4Oi1l4kyltd73fHPggsvLbxXOzQrqy9.exeFilesize
965KB
MD533d20674fa54803ff6116559f27b8ff6
SHA18781cbea5eac017ab400f1a6bc803302fb2ee30e
SHA256fbdc207fc6ea0cf118c5b974921913927da44a3daa4ca9dc5232279c57051773
SHA5122b1a7508ae4c165d21ee7274dced03ef2c390c032a7bbdfa5a755c91bf3dadd68036e05263a4c5690a19711efb8395feb4bc06693f525bd6006fc9ee8f0bdce3
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\AC\INetHistory\Kiakq6UXZBegLgTDSs0pTAHosOb4zysM3P2G0uN1BkYzM8.exeFilesize
947KB
MD5078662b8f1714a012264d21d6d71ad18
SHA1a89fba89c9ac6529257bda1ecae7a16cda6e958b
SHA2561b7c5de5ae0eafe73b4a83260aad7b82ce1ea67a1444165d7ef35ce0082c60d0
SHA512ce5c87e577dae712dea80a5036ec6482cd42999f21cfc093a119ce378d2a585f32b6f17ade569cbae690ec4feeec02a03a4ed38662eb6cddbf98e6f210ed39b7
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\LocalState\QNIdBMj2sbWogvq.exeFilesize
710KB
MD540ecf2189d8527b0a7d64900c18eb3da
SHA1b3987da2fb237e026a3236e37005514f62ef7252
SHA256b338546a7b2311f12f0f669a87a78bb6ef593072b54dfdace51a7182e446b008
SHA51277687611d15f38708759f1b8cf738398a49e40c41b65650eebd988d4066e8bd249536bf875c6c7153c908136fcaa75a610b37cab559f64095df8d1af42f31eb1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\AC\INetHistory\7XavigvAOoof44Eq9Z1mgudpKoAcyyoN98qaQRt6o1GarYrdtLEWQ9ORd0vgDV9BOOxf.exeFilesize
803KB
MD523f0b457da0fe7c69d58cb9790ef635e
SHA149c1b6ee0853b9a459e7607be720ffb5b06be8f5
SHA256547f57e97e29591c0c83ce0042ff8cf77593d4dd05f11ded7220c32646303718
SHA51274d2835294d753853d4453ea5fb6864f0a7cd6c0e0569d9459568600a393b1781142ffef8d6d4a15dcbda1be50400f50f0b382792a960a460cdbeaaed7770757
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.XGpuEjectDialog_cw5n1h2txyewy\q0I19XwRKvfRqKNzwEM.exeFilesize
1.2MB
MD542cbfb9e2f2a6aadc79cc0ed63e61704
SHA1dcf7e3a912cf413832adb7ebba261ada6ab33aed
SHA25642d249c0cfe9a9ad41bd865f3ba02b36b05b872a994019349bae64cd5b4364ec
SHA512934c1595ec8f95b36da9185035d6d5015a20704eddda88f2237c5cdb6d2a2d6e38c7c3970b54fd26722427e128c55c850f7c05dfe6844c986ecc696c7ffb8d59
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\6ZgxsJi7qCKKSN0z2y7AoN4rAnmTJK484whk6iUXmc0BzCLf0ScSW2qr216I0anuCaTs6Vs.exeFilesize
764KB
MD54fc8cf842bfc30ea20a3048c221903fc
SHA13a89abf4486bca44b62eda952096049aaad36aaa
SHA2569954097cb7e3dac6786a1316dec46346674539f13c3dde7ca16efc692907d344
SHA512873c2ba6a1920bc0fa8a8fb1a2d0d1ab9c35316f8f4ea2248d948025236196dbafcc9038d2ee9d5216b512dcaacc0efd8eb447791ed581a4e2344d12ca7c671f
-
memory/3464-137-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3464-135-0x0000000000000000-mapping.dmp
-
memory/3464-146-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3712-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3712-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB