Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:30
Static task
static1
Behavioral task
behavioral1
Sample
3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe
-
Size
1.9MB
-
MD5
1c9fcf4701e7b693f447a739036d76b0
-
SHA1
faf5383ff76452a4cd5d82c9043d32792ac751d3
-
SHA256
3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869
-
SHA512
79ac16a21600f9d018b956d379c2c459cacc8514ed5e0ed1acc9762409ab1c0a8e684c4aff95dff8418583479ea4ff2c276fc50ae4e0e8c4983df2eded9fc54f
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batdescription pid process target process PID 4620 created 660 4620 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat lsass.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exeajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batdescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy\\AC\\fwE7NKWrPshNYUw4EZbUvf8gHgQN2ocGnaFl7tUpGd122IepOQWggVqnXF3fCurlKv.exe\" O" 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessibility\\EebDN3rEqCO6OOdHM2cAt0iLhyJY6Ta9c8Y852GIOEXQ15Yc37BlwY63OHnYkE35cvw5.exe\" O" 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\ms-MY\\EqW7Y1PPfRdC4Og7fmUgB3zyc4i6nAM8cnTCQoEQMQvI86BPmWP04zhSdrpG2E.exe\" O" 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy\\TempState\\hX1ZMp2f91vwmuAoVvPburdGYPHjpYoTCDjsW1NOz84v0aHuZyRwUN88uG8txtxqRol.exe\" O" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat -
Executes dropped EXE 2 IoCs
Processes:
ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batpid process 4620 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat 3832 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exeLogonUI.exegpscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.VCLibs.140.00_8wekyb3d8bbwe\\AC\\INetCache\\xmYoQi5X6Ll3wuujn4JtlTUILDPAHdXX1bOXJefwBknGeb0Z9hRBuCntJcZc3lNsvi.exe\" O 2>NUL" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\\SystemAppData\\HqofVco1QizibetD.exe\" O" 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\PlayReady\\Internet Explorer\\Desktop\\geoyQS0VOdaZt6NGwmkk2k3mm3d7xrLItx5op7dvK0NOLNGNK1zqIHhW0.exe\" O" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\MSHist012022090120220902\\81pFvZpZhZO9kZj6fRKKvz6bq7Cc.exe\" O 2>NUL" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\\AC\\INetCookies\\7s2ZXvIgdWRzCSFuB99dzTVM.exe\" O 2>NUL" 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.VCLibs.140.00_8wekyb3d8bbwe\\AC\\s05cX7a8qSLDbdCQtaMrKhUdm3B48P9J0S9wK1JOBbrotBVb3HRAtLtPrLFcExBevr.exe\" O" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "223" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\hy-AM\\jnsYqT5PqK5fqGA8C2Vc4V4MfiW9ZlFGDg6WQsmx8O.exe\" O 2>NUL" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\ycivfgho.default-release\\storage\\permanent\\chrome\\idb\\3561288849sdhlie.files\\C0KQTWPotjB4OnaRdyWmHyalbA4RK8aCwKHbkFTYcohjYSERKMDsOibXJ08.exe\" O" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.Search_cw5n1h2txyewy\\Settings\\bsjQghpFUw8tHX97qhIuiL9MQQ6sy9R0ex7W.exe\" O 2>NUL" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\.DEFAULT 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.CredDialogHost_cw5n1h2txyewy\\AC\\INetHistory\\rpXt9Sil3dewUOwTis7OPLrhLYEGb58xHpOivM7C5MdEVUgPHLtJJ0a4Y6s2rGT.exe\" O" 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Key created \REGISTRY\USER\S-1-5-20 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\UEV\\InboxTemplates\\akUB5e4fktErv3J4YphmcCzl5lQnRPDYP8w11hly.exe\" O" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Spelling\\en-US\\BJbu1mVNxib.exe\" O" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{4234D49B-0245-4DF3-B780-3893943456E1} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 010000000000000054f51234e400d901 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-19 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\fks8vIKmvtC5.exe\" O" 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Storage\\ext\\gfdkimpbcpahaombhbimeihdjnejgicl\\def\\Local Storage\\leveldb\\xCH3ou722b4KoA2iLm43MBjeeWiA6ctINEU3KyjTznKyg0jXREVwP47ACfk2hPEfeLEukI.exe\" O 2>NUL" ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe -
Modifies registry class 10 IoCs
Processes:
3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Command Processor 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\Music\\k4wQYpc2Ue6Snc3KWOiurbXAoNF4W1KNV6FkiLVXZjL.exe\" O 2>NUL" 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\39\\9feEmlR5egcRB5J9jX316mxHrALfegPP0gj9gaa5CXf8m.exe\" O" 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\SOFTWARE 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batpid process 3832 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat 3832 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exeajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batdescription pid process Token: SeBackupPrivilege 5060 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Token: SeRestorePrivilege 5060 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Token: SeShutdownPrivilege 5060 3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe Token: SeDebugPrivilege 4620 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Token: SeRestorePrivilege 4620 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Token: SeDebugPrivilege 3832 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat Token: SeRestorePrivilege 3832 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 4756 LogonUI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
gpscript.exeajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batdescription pid process target process PID 1488 wrote to memory of 4620 1488 gpscript.exe ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat PID 1488 wrote to memory of 4620 1488 gpscript.exe ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat PID 4620 wrote to memory of 3832 4620 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat PID 4620 wrote to memory of 3832 4620 ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:660
-
C:\Users\Public\Desktop\ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat"C:\Users\Public\Desktop\ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
C:\Users\Admin\AppData\Local\Temp\3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe"C:\Users\Admin\AppData\Local\Temp\3a14602e987306e49f3edc6374081b0917fb6187e13e5bebd1a4c1909914c869.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ea855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4756
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Public\Desktop\ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat"C:\Users\Public\Desktop\ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.bat" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Search\Data\Applications\fks8vIKmvtC5.exeFilesize
3.3MB
MD552d6bcd7c49a3c80de6aee0b89d5919b
SHA1f4f03d877d19fe5de860526ddb21e077fc2a915e
SHA2568462d26bf301f34e5cc9caade38e928e103e00056660b62047481fef94036a2b
SHA512cc1791e0067946232626dfb81f7d5bd85cbe19a90709bedd29a536a02c0875e9f8604cf104e1ac1e178a03f14da7b4f5edd50ec5f5f24662a3ef626d3eea6c39
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\ej8rSnvvuKiNFqHr.exeFilesize
2.0MB
MD520ed027c11462e95c09f37bb1a658f54
SHA1722237af72ec0be6a971b8e45a697849bf0948b8
SHA2565100c7f634de4252a6da69902c484100605d7707443e0f3f9471c97ebb64c9f0
SHA512ff260dbb66a827abd3329f1fed332bdc041270d6572d25926d69d62325a5448152811429b91066bbb177102d6f817275a3dc437ed4f7e3d8d8bc5b3d46acf856
-
C:\Users\Admin\AppData\Local\Adobe\Acrobat\DC\drlrgVg4ihghTY89q0fqD5lFT241XgvpbmWh1nyEhX5RndJQITxXw7WmXHZF0ICh.exeFilesize
3.4MB
MD58c8d55d5fec150c6223a3ffab7666e1d
SHA11b059785a97028ec7db0e36bfa0a9775e89f0305
SHA25636480372f0b2553c5f501066a77b6e5ed10e195f56a73e3f72030f9d597266d8
SHA5122ae87128482f9761336aed46aaafae5d228b4d5e94b8e3ec0cc1636fb7ecca8e4b38353ef0e2fd8a0f6a5b68608c5ae99f97e04e0492a28e6de7d12dceddc818
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\el\n7iHp8oEVb92nMh7YEl4QO2.exeFilesize
2.9MB
MD528057a2ba0da5f7ab52e81f7b59bb843
SHA1f35676ba2b3bb72ab9bb6750f80cbdbf16f15275
SHA2561441e0a50cdc8d6dff9aa8da719d6b971367d550a37a13056e9627dd9b7f7591
SHA512b11b13ade9a5aa8b3b2233aa09ef49ea4c4a9f33e3922b7b9ad87929fc34baeaf81f4b5d5b773d594f5b7fc814c8b8ab588825e42aefc133ba3b5d7bdd428211
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012022090120220902\tyla9CzFnUPT37BxV6CqF9scPtXqs7X2oXmA.cmdFilesize
3.0MB
MD5c56d94522237d3e7c91742e4bb0c52e0
SHA1bdd5c6a2afc9091620a37169d1568852d1c7b28c
SHA25659a2490b2f9e4216c10af6154498dd547088e0a1c1f1355c8f4bb28050c1737b
SHA512ac445f8539c5acd307f6b5f02dfe96c00238a05460b4e29cdc37ebae569ca2d8c8d73db32b5e972c0311d217de63569c00d643b775b513b8e1f36de2b08a91a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Ringtones\5BgJMoiBXLa7C8NPapIopm7xKzxlW1bROVtORwuQB9ElsC4dEhZPcZeyvppMm.exeFilesize
3.6MB
MD5804fc8f054a454b8b544f7cd71a11422
SHA19bc78a3f3966f3d03145fd49300ac9e43a09c186
SHA256c3fe2a90333693a931c2091c9724cb05afc288e0fdc42c80e8190b36662dabf1
SHA512c0d35366de1aa4c9fd25b2d6384a771a3d76838be5619024651edea53f28154303660da68a60937d05a2e82ea2a530aa1e68797a7efa2cf92c92fbb8f257cbe3
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState\PinnedTiles\7603651830\gSQuRN5XW64jUaz9R4GaNa1w3keq00K1BdIof7NJUAlKkSYG5NK3oxDf.batFilesize
3.8MB
MD510bd03f154e555e485a505ce585ce9b3
SHA12fb9f0f27181dd78f8b88b75ca3f7210a0c0f6ec
SHA256d7b4924fca0fdb82b3bce4991c1965e926bd82ad4afd70eddf4743a8154dc014
SHA5120e5854d3eb6603f214067e37d902f8085e5dfbc44182f0bb2ea3509b76fb3aa777652c6b33e6c4e2e0b5ea56d6deaed0203baf81c9c744fc634b064c97a5ca6b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\TokenBroker\Cache\PQjmHJv3KENddKOT4ZizeZaSUFqRs9hmRkaN2J0gQ6NPoeLthNmQtxUj.exeFilesize
3.3MB
MD581dc37a5abd0bd3d1c37c7d4dab2ef6c
SHA107b3958a16669dc1840d476ed683934874cd6d15
SHA256a15f58d20408b844c99f540698e4a9055a44d25800f0213c9eed51a98dfead6e
SHA5129283057758b4728c7cd2349ef8e27a055987d2bd4423e31edcdc8fbe95d8bb6a56431c1053ed19d934cb0424fb9294293fc34c02198edd02f2f127c8f778dc5c
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SystemAppData\HqofVco1QizibetD.exeFilesize
2.0MB
MD5600780d09adec6ddeb3c288f09d23349
SHA1b1a893885d3c0ef7e14c18071bdf473d488711f9
SHA256e21426441d52ba28d1834ad70c67af7f0109a5b3b0c51a9508a2b7cfcd5db12a
SHA5127c84ad7a557d8be95a586a95d18abbd09eeae063f6ecd5f8761594bbcb5883555bf7f41ab528a42496134abd1cd83585332f81edbacf7de53bba9a091a258951
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\EebDN3rEqCO6OOdHM2cAt0iLhyJY6Ta9c8Y852GIOEXQ15Yc37BlwY63OHnYkE35cvw5.exeFilesize
3.3MB
MD555b2f92515527ba33693c2d8144f8863
SHA1248b8525a0194599e0a525ce5d080bad5126fc1b
SHA2560b152211ced1ef5d363b9e7efeb0d5fb88985e9e5b345a0b2aee476fa1d731bd
SHA5127e529dda553e7dd4a2ca6eb4e1609f2f91b441a25558d21a5dea0a0cb2f01df0c269d7a3eacd2005cb9d81287520ad184c5ca91b1c389d32f1d80167c22455a5
-
C:\Users\Public\Desktop\ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batFilesize
2.9MB
MD5726ca7cecc0b64017513634c855b0172
SHA1ed7d88872215c3f779364223fa0442317f1ea371
SHA25675719c23e5b019b50953cd760a1e37cc50c1de23ab4d6c569bbb13c466a9cc5c
SHA512c434aeca65eb0183f10e3882cfdaa01c327f983c32f6976e7562bdce05fe57398e108a8787b71f1b6f8e64d200664e4a16fd697aa7ecb638b97e551d513a30ba
-
C:\Users\Public\Desktop\ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batFilesize
2.9MB
MD5726ca7cecc0b64017513634c855b0172
SHA1ed7d88872215c3f779364223fa0442317f1ea371
SHA25675719c23e5b019b50953cd760a1e37cc50c1de23ab4d6c569bbb13c466a9cc5c
SHA512c434aeca65eb0183f10e3882cfdaa01c327f983c32f6976e7562bdce05fe57398e108a8787b71f1b6f8e64d200664e4a16fd697aa7ecb638b97e551d513a30ba
-
C:\Users\Public\Desktop\ajBMsNIWeGYaAgFyqzfkKkMZmchSqBOMrw15n.batFilesize
2.9MB
MD5726ca7cecc0b64017513634c855b0172
SHA1ed7d88872215c3f779364223fa0442317f1ea371
SHA25675719c23e5b019b50953cd760a1e37cc50c1de23ab4d6c569bbb13c466a9cc5c
SHA512c434aeca65eb0183f10e3882cfdaa01c327f983c32f6976e7562bdce05fe57398e108a8787b71f1b6f8e64d200664e4a16fd697aa7ecb638b97e551d513a30ba
-
memory/3832-147-0x0000000000000000-mapping.dmp
-
memory/3832-150-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4620-146-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4620-137-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4620-149-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4620-134-0x0000000000000000-mapping.dmp
-
memory/5060-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/5060-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB