Analysis
-
max time kernel
165s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:31
Static task
static1
Behavioral task
behavioral1
Sample
19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe
Resource
win10v2004-20221111-en
General
-
Target
19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe
-
Size
1.5MB
-
MD5
4aa3597334eb887f0e8be6fada94749b
-
SHA1
6545fc5fefd0da46c07b7907daf6e69072fc34ea
-
SHA256
19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf
-
SHA512
6df6cd2bf30612864043203d6158113639b8e5c237a32082dfc6b9cdbf4848ad4484c9237424a0ba963590fffe1d04619e5eb4cda743a0daf5a5fdd6782158dc
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exeqOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\DRM\\nt8jcqZiPWQwDEUu9zLECfhEnJCB8C2opz4EQiJTvB7.exe\" O" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\data_reduction_proxy_leveldb\\GdPJbBDALanVADkaI0v2DnonyLl3ePUU9ave5YTiQckB9X2yDGbgvgqraNkqAid.exe\" O" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Adobe\\Acrobat\\9.0\\Replicate\\dQSLlJPHbgiZ8yhoBiUcUaP5qPTAvUuXehP7UI1A1Dz6CJKKeygSV4MzepT2SFoeuYryEgC.exe\" O" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\DeviceMetadataStore\\en-US\\zQ4cQkLrNJrs7AgAWjL2jl0ZLdwkl9sx2uh3LGfirEQRw.exe\" O" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe -
Executes dropped EXE 1 IoCs
Processes:
qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exepid process 972 qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe -
Loads dropped DLL 2 IoCs
Processes:
gpscript.exepid process 1232 gpscript.exe 1232 gpscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 58 IoCs
Processes:
19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exeqOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exegpscript.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-19 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\43\\F7U8UdOS9Mj4QMW.exe\" O 2>NUL" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\\VgDuy88NWNT2FVZXbgCn2RXic5csvRi.exe\" O" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Internet Explorer\\WgsuVDU1CKu.exe\" O 2>NUL" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows Defender\\Scans\\History\\Store\\VlH7sApUnYVm0lJUcZXHj6ywO4WI2StMKGMobggwKuu4ME4nLW3T9ktY0TcLO.exe\" O" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-738 = "Start Internet Explorer without ActiveX controls or browser extensions." qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Config\\QU11H5nl1g1VdHvVK7tyyCc9c1NtZatO.exe\" O 2>NUL" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Flash Player\\ggtcOi5LS65DtpXoF6cHSl9pUlPXtzqPMlCYdLlNFGk8ZcaF7wa5XsMCpCSopwLUm.exe\" O 2>NUL" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\RAC\\RYnYUYvuOjnpSWE1vBH16hgtzpElfgZ6MOl096Cx2UlQlYu5zGTR.exe\" O 2>NUL" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Internet Explorer\\imagestore\\try74lz\\C3k3lM8RK2QWrCOy7uLpE43qCWSBlTpVRJycCLRRB8FrErbQjOiWulccsK0n.exe\" O" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Media Player\\vEAcJSTXfWVItEg.exe\" O 2>NUL" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\.DEFAULT 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\\packages\\vcRuntimeMinimum_amd64\\qjvMKTkBallUrxo.exe\" O" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Feeds Cache\\C3HYMVKZ\\QTBcYsX1Fp6KHP9l9bF.exe\" O 2>NUL" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Projects\\SystemIndex\\SecStore\\MqliIVwDP8OgMtRcIxvP03wmLK9Yb88a6f5lnR24TGBngT2ZSGsZ8WibywkAFC.exe\" O" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Adobe\\Acrobat\\9.0\\Replicate\\Security\\9roQE1qBp.exe\" O 2>NUL" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\20\\0F9cA9V8wB1WLUY9RkZ5EqZqvIBYNwl2NEU4SkFX.exe\" O" qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\GatherLogs\\nYwTRFFgb.exe\" O" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached gpscript.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000309d45d0eb00d901 gpscript.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\MF\\RZUu3Gis5byfZhrAj9BhoK9fS6GIALkdB9osWZWaEaXSqx1T8EebAJvZfLR5sCt.exe\" O" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000f0959feaeb00d901 qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\Desktop\\GTUxjelDizlquDSrKLVboOnc6mL1uBJkHRPtjCJLZdcmti97Dudor1CWS2wPCkdxasfC6z.exe\" O" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\28\\hz60KDqZpwGXI67NeQYxkRseE8O7l9lUX1FASSrqRaxZ5B80s4HXsAeWWkgA7vkp6iris8.exe\" O 2>NUL" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-20 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe -
Modifies registry class 12 IoCs
Processes:
19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Command Processor 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\SOFTWARE\Microsoft\Command Processor 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows\\AIT\\S6YOx3OYtFXqKT4NtZvSMYt19mj0.exe\" O" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Default\\AppData\\Je6qSDlhYoMlmVx.exe\" O 2>NUL" 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exeAUDIODG.EXEqOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exedescription pid process Token: SeBackupPrivilege 1808 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Token: SeRestorePrivilege 1808 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Token: SeShutdownPrivilege 1808 19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe Token: 33 1332 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1332 AUDIODG.EXE Token: 33 1332 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1332 AUDIODG.EXE Token: SeDebugPrivilege 972 qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe Token: SeRestorePrivilege 972 qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
gpscript.exedescription pid process target process PID 1232 wrote to memory of 972 1232 gpscript.exe qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe PID 1232 wrote to memory of 972 1232 gpscript.exe qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe PID 1232 wrote to memory of 972 1232 gpscript.exe qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe"C:\Users\Admin\AppData\Local\Temp\19c47ff5ff4cdf1e6f3bd11a04c373fa9208646cf96809048daa88d68c9f31bf.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:268
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:432
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exe" 12⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\DRM\nt8jcqZiPWQwDEUu9zLECfhEnJCB8C2opz4EQiJTvB7.exeFilesize
2.1MB
MD5a2a82ac6271eb74eebd98be95d55c262
SHA18aff38e01d2a43d78ff07829b76a3f31154e6039
SHA25644ceb5c18c51242157269c63ff50218ecd85170afecb4a306bf29a456593bcbe
SHA512cacd7beb0eea76423e7d87cd0d621dfcbb8b6001eb7eb78ba976fff93acc3d0dcfb8fea24dfbadd22b5578ddbceab717422e1ca202d811f216c9a539eb0ad664
-
C:\ProgramData\Microsoft\MF\RZUu3Gis5byfZhrAj9BhoK9fS6GIALkdB9osWZWaEaXSqx1T8EebAJvZfLR5sCt.exeFilesize
2.6MB
MD54684080cf97f5cdcb022ce2e72e5f545
SHA1dfcf8b625956fe17bab108b4d98b4316bcf24881
SHA2569f583948e2fdc45308da87edb49a54bc64e41ca345d2a30f45dcfbbd095599b8
SHA51202daa2e477539f19816057bd6c45402c79fc6ccb420be486f02ab9fe28dffaddab2766dede10deb024a1690174ae96544188d8a4c65f903c2b908fffbaf0ac9b
-
C:\ProgramData\Microsoft\Media Player\vEAcJSTXfWVItEg.exeFilesize
2.3MB
MD5c5b169e5b6922409b6e086736857583d
SHA1ea3a5d7d98b4382b35bea017b1de24620857eed8
SHA2565c5fc2bf7e094c737342bff6b4e8a543cea254c45034e8d9df236f5ad130e923
SHA51267ebdf7c1b4c5afb8f5a5d77a9597f37dda1010830663b3d0616b196fa9564dd1dfec8bad3593a8af87548f1c9f4f2972bccb406eccc3a8d53867ba5946e9d9a
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\nYwTRFFgb.exeFilesize
2.8MB
MD5088cecefe27c21cee76705047ae1f6c5
SHA1e9d340ae132a0b956e096fe6326bafa5858606a0
SHA25625b8d77a291c30c23564f6f3757a37b8d45e23594649c3b152ae712bf64b50a4
SHA5126f37603139862ba98d4d9993ed9158dc3759dd3ce95d70be59d39f3761dac9f3b004dc5bb2b6395d9b316afb30f6c0c614beb2ac3fe3adea276770068c1c871a
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28\hz60KDqZpwGXI67NeQYxkRseE8O7l9lUX1FASSrqRaxZ5B80s4HXsAeWWkgA7vkp6iris8.exeFilesize
2.6MB
MD5573e48be061ad802365191174253d164
SHA16e3d1bc17ff241a0833665a19df837834a0b0768
SHA25682d7226d2240dfef9296b9bbe5fa710394d981f1d7781950f303817084f48138
SHA512dd091c356d0af8f0f144e2fbc5e40b69accd83f122b4273ca49b7f954dd3fdcaaf932ac5e43d4ab4ecfcb9d0f301c528ce1d05ae768e85de846a54263dd8c35f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\hyphen-data\VaDTImDJKY85IqANuBmiy82uLaspS8yE0HJWh5npSneG7jKpMaTmfKYsu6hzzRsJg2iLAK.exeFilesize
2.4MB
MD538f1b019b08d80dff1ed5210b8ce101e
SHA1f7fc0acc7f69aa5353e0a57542b4b46500552719
SHA256518539f9b5ae23968f5e33444cd54a1a315eb4428a2dc8edcb46fafbeb57c14c
SHA512f7b23972f00904971626a65956394ba3fb367cd16cb80d9ee9b89488354d1262c5305116392423ec32d920fe36ab34809bb200236b5f5291a6f556a8ead6c4c1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\WgsuVDU1CKu.exeFilesize
2.7MB
MD5e29d9694ad032900d2df7d084491c66e
SHA10f9dfcf73c5a5ccc83c6a54eeccaba71ec52a1f7
SHA25658400342a3e2db0fdccf16e5a522895b238596d7e1fec85911450a5230e0485c
SHA512c6b49f7e16eaf033d39f316d2a61bef192ca7c871988a86eccb43e587bfc2a2653f633df942ef9eb3c8d8e38bc9043ca7d3751acc3e6eacb8bf19ea909b1cda9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exeFilesize
3.1MB
MD59578bda4421ca8a20c0844e216738167
SHA1539c498e8a423232605a115960c97954c996e3dc
SHA2564e3a10a4a2da91adbe8bf6e4a61f6f1f348ad6fe147768f5722dab9a9d063696
SHA5129ee2bd662cc5aad1a4ebadcf68a22cd8713e6e9a118128fd63f7b12ab2fa1088056d7316d765da34d685da1a2c7be5e311b1def2c1e65ad371b47adca94bc9ef
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exeFilesize
3.1MB
MD59578bda4421ca8a20c0844e216738167
SHA1539c498e8a423232605a115960c97954c996e3dc
SHA2564e3a10a4a2da91adbe8bf6e4a61f6f1f348ad6fe147768f5722dab9a9d063696
SHA5129ee2bd662cc5aad1a4ebadcf68a22cd8713e6e9a118128fd63f7b12ab2fa1088056d7316d765da34d685da1a2c7be5e311b1def2c1e65ad371b47adca94bc9ef
-
C:\Users\Admin\Desktop\GTUxjelDizlquDSrKLVboOnc6mL1uBJkHRPtjCJLZdcmti97Dudor1CWS2wPCkdxasfC6z.exeFilesize
2.3MB
MD50287e86cf91466e0c2ea95c09d2a3b4a
SHA14e368ff28a1a86096fb2b12b8afabce81b247cb1
SHA256c9421a54faad55194b895915fe88cdaa9c0cf2a50e35a583c51875825afcbdf6
SHA512df190eff259ffb5176653e6e5eea069c35bc223ddfb174837d0bf7d1c7f74cd68fa2124a98edd7eca99d07c949a544bbf00b9da3452f91deab535bd740c1a94c
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exeFilesize
3.1MB
MD59578bda4421ca8a20c0844e216738167
SHA1539c498e8a423232605a115960c97954c996e3dc
SHA2564e3a10a4a2da91adbe8bf6e4a61f6f1f348ad6fe147768f5722dab9a9d063696
SHA5129ee2bd662cc5aad1a4ebadcf68a22cd8713e6e9a118128fd63f7b12ab2fa1088056d7316d765da34d685da1a2c7be5e311b1def2c1e65ad371b47adca94bc9ef
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\qOn5LAZMfhCIGS8PP9AKL6g8djDAqUgt8i3WgU2ILcxpZ7G7EjwmB0C.exeFilesize
3.1MB
MD59578bda4421ca8a20c0844e216738167
SHA1539c498e8a423232605a115960c97954c996e3dc
SHA2564e3a10a4a2da91adbe8bf6e4a61f6f1f348ad6fe147768f5722dab9a9d063696
SHA5129ee2bd662cc5aad1a4ebadcf68a22cd8713e6e9a118128fd63f7b12ab2fa1088056d7316d765da34d685da1a2c7be5e311b1def2c1e65ad371b47adca94bc9ef
-
memory/268-56-0x000007FEFBFB1000-0x000007FEFBFB3000-memory.dmpFilesize
8KB
-
memory/972-63-0x0000000000000000-mapping.dmp
-
memory/972-67-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/972-79-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1232-66-0x0000000000EC0000-0x0000000000EED000-memory.dmpFilesize
180KB
-
memory/1232-65-0x0000000000EC0000-0x0000000000EED000-memory.dmpFilesize
180KB
-
memory/1232-77-0x0000000000EC0000-0x0000000000EED000-memory.dmpFilesize
180KB
-
memory/1232-78-0x0000000000EC0000-0x0000000000EED000-memory.dmpFilesize
180KB
-
memory/1808-54-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1808-57-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1808-55-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB