Analysis
-
max time kernel
165s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:32
Static task
static1
Behavioral task
behavioral1
Sample
c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe
Resource
win10v2004-20220812-en
General
-
Target
c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe
-
Size
672KB
-
MD5
fa2c4c22089e8d276090e32e6343b32b
-
SHA1
aaeb98404f858b52f615243cc1f9f63df0510566
-
SHA256
c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5
-
SHA512
7f617e01deedf66ccda9a8f424f41b39b8f62ae5ce016fce85768ba9536c87f35211b6622d8d87a619fbebbbedf2a73790795ba831473da65fe9ec163629bc4b
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
dWTc9zqoDD6KruFSmkbYbxN.cmddescription pid process target process PID 3044 created 672 3044 dWTc9zqoDD6KruFSmkbYbxN.cmd lsass.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exedWTc9zqoDD6KruFSmkbYbxN.cmddescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Default\\AppData\\Local\\Microsoft\\InputPersonalization\\TrainedDataStore\\2Zi9pK1KT2abFfSC8qw6F9itAR3ySXLaocO3.exe\" O" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\\TempState\\PA3bCgDPPAfbXB3BdeqFNugXDkAZmsXYMykLYfWAdpy3y85PgCCl6Cl89MAvwOklvQoKI.exe\" O" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Low\\t4IokxwreIKFHHbUpcEDho07Ejhk.exe\" O" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\quz-PE\\EE7hm55CNTPU4XUaYQy2bl1TmT9F0Dy7FpNlHyennKSVvoPlIu.exe\" O" dWTc9zqoDD6KruFSmkbYbxN.cmd Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe -
Executes dropped EXE 2 IoCs
Processes:
dWTc9zqoDD6KruFSmkbYbxN.cmddWTc9zqoDD6KruFSmkbYbxN.cmdpid process 3044 dWTc9zqoDD6KruFSmkbYbxN.cmd 680 dWTc9zqoDD6KruFSmkbYbxN.cmd -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
dWTc9zqoDD6KruFSmkbYbxN.cmddWTc9zqoDD6KruFSmkbYbxN.cmddescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " dWTc9zqoDD6KruFSmkbYbxN.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " dWTc9zqoDD6KruFSmkbYbxN.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " dWTc9zqoDD6KruFSmkbYbxN.cmd Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " dWTc9zqoDD6KruFSmkbYbxN.cmd -
Drops startup file 1 IoCs
Processes:
dWTc9zqoDD6KruFSmkbYbxN.cmddescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pCveywBx2j0rqILr2.exe dWTc9zqoDD6KruFSmkbYbxN.cmd -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
Processes:
LogonUI.exedescription ioc process File created C:\Windows\rescache\_merged\2229298842\619956953.pri LogonUI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exeLogonUI.exedWTc9zqoDD6KruFSmkbYbxN.cmdgpscript.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dWTc9zqoDD6KruFSmkbYbxN.cmd Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\1527c705-839a-4832-9118-54d4Bd6a0c89_cw5n1h2txyewy\\AC\\Temp\\2XwM3yhZ3WRYVCk4W4TL9KHFTX7GROOSEN.exe\" O" dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\da-DK\\M9vr5H2b6VV8AYwyLUFpH5Axpebtx1H.exe\" O" dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\RetailDemo\\OfflineContent\\Microsoft\\Content\\Neutral\\Y2xxjYCOddzEkspuxHYaPfDKxw8.exe\" O 2>NUL" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy\\AC\\zIjkXkhoD7ucmVumfJkA1YeBsODSzCOLaSf5TxMUxsT86ZKA9ITvynhfq.exe\" O" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer gpscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\vybwayxr.default-release\\storage\\ICkHPMERNaTArLVSm0ygL0amheGHER3rbVnZwMWZw.exe\" O" dWTc9zqoDD6KruFSmkbYbxN.cmd Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\input\\af-ZA\\5jcym2NkoR9RqC7GScANfyj4ODed42yMQ2yYA7N80WDaumYznAImnzJE91G4QeIAXVO.exe\" O" dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\\LocalState\\dNVXt6kmf2Or8Atc1TdzeLkccPshGjOg6QYQudl3Kk7.exe\" O 2>NUL" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\.DEFAULT c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-20 c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\TargetedContentCache\\v3\\280810\\j0nqUQ7Agdqn0MhxBfqX3Et50uhedLytfuNRZciu8Ln9ajhOQIBrdTxoOEksDkot55uvTjq.exe\" O" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\pKPcjBXDJKP.exe\" O" dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\ShaderCache\\5XCxbCZRbVxuJGedLUYlalN9k.exe\" O 2>NUL" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 gpscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\AccountPictures\\9SITtKKMrFiC8kctWvOOKkutdeeURiUFYFzlWmK8Iri0Re4MzW7ovHetyf.exe\" O" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\ContentManagementSDK\\Creatives\\280811\\1ihCTvJbPKbaxVZ5GkyVWhY6dMsEH1TGuSW9LciZt8ngx0LGjSkxA2aKc7j7TNaeXcfbE.exe\" O 2>NUL" dWTc9zqoDD6KruFSmkbYbxN.cmd Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dWTc9zqoDD6KruFSmkbYbxN.cmd Key created \REGISTRY\USER\.DEFAULT\SOFTWARE c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\Desktop\\TIUgSdNi27dmjlGJbc7j2X.exe\" O" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Speech_OneCore\\bgc2QUWwhik.exe\" O 2>NUL" dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Mozilla\\Firefox\\Profiles\\vybwayxr.default-release\\cache2\\entries\\uZgtfppxmn.exe\" O 2>NUL" dWTc9zqoDD6KruFSmkbYbxN.cmd Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19 c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "169" LogonUI.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Comms\\Unistore\\data\\Ft9Z3v226jPHokI5GRxwdeTed38NprSKSv35LYLsojRdk1F49My7QsTJEYZ.exe\" O 2>NUL" dWTc9zqoDD6KruFSmkbYbxN.cmd Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\wo\\1FBWiya06TspHHCUnFpGTh02edLgAxWVvvKqsHMVNttTTMfhyGQsYzVZS.exe\" O 2>NUL" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe -
Modifies registry class 10 IoCs
Processes:
c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}v12.0.40660\\packages\\vcRuntimeMinimum_x86\\2hTQCWVhx6MDMIo3WH8icz8yDqI7EKa6KU9PgswgtTC7fJMoscXcIggs3QvV.exe\" O" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Command Processor c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Win32WebViewHost_cw5n1h2txyewy\\Settings\\t6oyOkLLmolESOj.exe\" O 2>NUL" c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dWTc9zqoDD6KruFSmkbYbxN.cmdpid process 680 dWTc9zqoDD6KruFSmkbYbxN.cmd 680 dWTc9zqoDD6KruFSmkbYbxN.cmd -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exedWTc9zqoDD6KruFSmkbYbxN.cmddWTc9zqoDD6KruFSmkbYbxN.cmddescription pid process Token: SeBackupPrivilege 3292 c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Token: SeRestorePrivilege 3292 c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Token: SeShutdownPrivilege 3292 c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe Token: SeDebugPrivilege 3044 dWTc9zqoDD6KruFSmkbYbxN.cmd Token: SeRestorePrivilege 3044 dWTc9zqoDD6KruFSmkbYbxN.cmd Token: SeDebugPrivilege 680 dWTc9zqoDD6KruFSmkbYbxN.cmd Token: SeRestorePrivilege 680 dWTc9zqoDD6KruFSmkbYbxN.cmd -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
LogonUI.exepid process 5064 LogonUI.exe 5064 LogonUI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
gpscript.exedWTc9zqoDD6KruFSmkbYbxN.cmddescription pid process target process PID 2556 wrote to memory of 3044 2556 gpscript.exe dWTc9zqoDD6KruFSmkbYbxN.cmd PID 2556 wrote to memory of 3044 2556 gpscript.exe dWTc9zqoDD6KruFSmkbYbxN.cmd PID 3044 wrote to memory of 680 3044 dWTc9zqoDD6KruFSmkbYbxN.cmd dWTc9zqoDD6KruFSmkbYbxN.cmd PID 3044 wrote to memory of 680 3044 dWTc9zqoDD6KruFSmkbYbxN.cmd dWTc9zqoDD6KruFSmkbYbxN.cmd
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\ProgramData\Microsoft\Diagnosis\TenantStorage\dWTc9zqoDD6KruFSmkbYbxN.cmd"C:\ProgramData\Microsoft\Diagnosis\TenantStorage\dWTc9zqoDD6KruFSmkbYbxN.cmd" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:680
-
C:\Users\Admin\AppData\Local\Temp\c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe"C:\Users\Admin\AppData\Local\Temp\c438548d791979a287906fe42a1801f88dbb0c314b39ca209375e6452d685ad5.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ed055 /state1:0x41c64e6d1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5064
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\ProgramData\Microsoft\Diagnosis\TenantStorage\dWTc9zqoDD6KruFSmkbYbxN.cmd"C:\ProgramData\Microsoft\Diagnosis\TenantStorage\dWTc9zqoDD6KruFSmkbYbxN.cmd" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Diagnosis\TenantStorage\dWTc9zqoDD6KruFSmkbYbxN.cmdFilesize
919KB
MD544465c81ec396b733afa6c87ee8ed604
SHA147978c2733e9f3bd563687df7fad8ebb1bf12473
SHA2561889c6d3f5c87d688841dfd3edf293f843e48510327233111dc17296ce1592af
SHA512ec69755910df6a8ae133400ddd2dead43cf80d6c6d0b79ab884460b4b1ef0a6b534089bcda94d7e92a21688588d11df3227d2c18535542c4cda9ae2049043408
-
C:\ProgramData\Microsoft\Diagnosis\TenantStorage\dWTc9zqoDD6KruFSmkbYbxN.cmdFilesize
919KB
MD544465c81ec396b733afa6c87ee8ed604
SHA147978c2733e9f3bd563687df7fad8ebb1bf12473
SHA2561889c6d3f5c87d688841dfd3edf293f843e48510327233111dc17296ce1592af
SHA512ec69755910df6a8ae133400ddd2dead43cf80d6c6d0b79ab884460b4b1ef0a6b534089bcda94d7e92a21688588d11df3227d2c18535542c4cda9ae2049043408
-
C:\ProgramData\Microsoft\Diagnosis\TenantStorage\dWTc9zqoDD6KruFSmkbYbxN.cmdFilesize
919KB
MD544465c81ec396b733afa6c87ee8ed604
SHA147978c2733e9f3bd563687df7fad8ebb1bf12473
SHA2561889c6d3f5c87d688841dfd3edf293f843e48510327233111dc17296ce1592af
SHA512ec69755910df6a8ae133400ddd2dead43cf80d6c6d0b79ab884460b4b1ef0a6b534089bcda94d7e92a21688588d11df3227d2c18535542c4cda9ae2049043408
-
C:\ProgramData\Microsoft\Windows\RetailDemo\OfflineContent\Microsoft\Content\Neutral\Y2xxjYCOddzEkspuxHYaPfDKxw8.exeFilesize
856KB
MD5c996dd1ceed4b7b51e6ad445e9f450dc
SHA1b5743aafebd4ee8e68aebd88760f904b037b5374
SHA25615004e2cc734299804e20555d55f2bb63517faeb4273ec2fda59b0b24c527c43
SHA51285c31599b2b882a6109336a7c5f98e2ffc2df7b68536d5601d74e57b26a623e10e7084ed8dfb59928fc8ab896393d88d9e093288ce1d7e0a41317358eb90650b
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\fT0k9Ok120F2hYj8LE4Zm52gOnJD8gPoMIsCaGCHJbl1LshDj2lSDV0ibW6dXnDxFGdVkbt.batFilesize
1.5MB
MD52c97efac8fdd30319406d7cbbc0cfeda
SHA15c48ed26defce842719e59dc46d964135220eafe
SHA256b9b2eeec23db2f1bc46f7bfce9d3421ebc49422f80a0a474ac5627e9b1c20a7d
SHA512648c97568cf4ab9e489b66f727b77565d346a89d30303f3c31c109507513888fa8e41ee2749253d34bbc47b2c7e8d9709019c4ea17c3fb973840f96b868ffc13
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\5XCxbCZRbVxuJGedLUYlalN9k.exeFilesize
1.3MB
MD5a87fdf18015b92649a8a1f2af91c885b
SHA15d6cdcf1beb38250c8987130ec8dd0c456718502
SHA25613579764567624c98efa77181d47bd310ba4012b1ea1bdaa2cb942720d6f834b
SHA512e103f758357951b52a28dfac1d7e2f01c58fddc45328f35e0b630466f7b5753ef372c5eedaedcbf239273495e5b41b76cdbf305dab58be85774f19504d109c15
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\wo\1FBWiya06TspHHCUnFpGTh02edLgAxWVvvKqsHMVNttTTMfhyGQsYzVZS.exeFilesize
1.1MB
MD5202939b870d529ee431c546c15e1e8d8
SHA1fbdde3f1c3a252c7d2d552b124f2788d3642aa73
SHA256d094f539de2ccbe84ff0c2f64bcaeb8a51015c865853fcf5b1629c2e126aca5a
SHA512a6246a7b1dbdaa8c686b2566997d65816717d2081c73e2a75cb6a96eacd7bc7e44eef202c988504c6489dd34dc670ecf4f437a8840e251cf4573a44f688df2e8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\LjGC1w9E6IXe4gT.cmdFilesize
1.4MB
MD55b4d0d1f0187504321a96dfd2c2e4c0c
SHA13745a8b9754c81c2503f81352e8877546cacebeb
SHA2568e3324698f7441d4638f44f0da88378b9a31359c87fcc6128e62e02fb5f3066e
SHA512fb598758bb77f80fcfac69b1d4c2db9c62a56e6d73430df84fb6664ffdbf5cf376d8e35853ceb79bff7a91cf67c37b97107f2369a4dfdcc0685d610ba07443a2
-
C:\Users\Admin\AppData\Local\Microsoft\input\ar-YE\Ga5nvH4UXVhIEuR3jQzsTxf3fj9IXyd8wI9oc.exeFilesize
1.1MB
MD5b1058fc914e09aacf8eff9f7574da6fb
SHA17095df3379135d51e376aa544fd67df0644a0d94
SHA25696c513ae8cbee5c7533ee5b6dd5b6f9a620909d49e5a0612a0df76f1e8d6fde8
SHA5123839fb25f12284b80c07169f4205d46fde5187cf83cc561f09debe0c69e7b18fe8beab7e7b32b1f07463d68de6feff29d8d81f24a6bcb9a07a218aba4a1c1d5a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\TempState\PA3bCgDPPAfbXB3BdeqFNugXDkAZmsXYMykLYfWAdpy3y85PgCCl6Cl89MAvwOklvQoKI.exeFilesize
784KB
MD5e06cb8bf7ff3d8ee5a7e461f3eab54d4
SHA166cde63e31327593f5e738c95b11c163ab62f64c
SHA256227a20e4ae62a4febe241e38332d264bed5ea47ece41845d08cee8462a464dc0
SHA51248556f07dbf631a2de61838f288e5dda5669fb70bf6f68993617aa6fa50203ea05436cc19cf4a731199632b463044b679f5277a34c571561ca103aa56d47dcbf
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\TargetedContentCache\v3\280810\j0nqUQ7Agdqn0MhxBfqX3Et50uhedLytfuNRZciu8Ln9ajhOQIBrdTxoOEksDkot55uvTjq.exeFilesize
731KB
MD5c69acc3208ffbc090376c05340f79e62
SHA114e091293b2b64e81693844c31c05f85b7526309
SHA2567f57020e15e01d18f0aef9190ae7172e78f3886478ef0768a132d3dcf2e4e0c4
SHA5124fa1cd83572544d4202f91892ae01cc9103de3788a0fc4e61b18f0fa324f279d5c4139003dfc3b202bedfe9eccb6694c37051fa642c651e164bcbb20d4114d85
-
C:\Users\Admin\AppData\Local\Packages\c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy\AC\zIjkXkhoD7ucmVumfJkA1YeBsODSzCOLaSf5TxMUxsT86ZKA9ITvynhfq.exeFilesize
926KB
MD545edf03c32662c332abbb8e5b64fe1a2
SHA1c3ba8bade26d0fd6cbea30bf59175c33b40d6adf
SHA2562b853b85b879f1b5eb4ce97717b409969c5cb8594b8ba12c098243366af20926
SHA5129fbef6934653f648b17987ddd6bc7037a7779ea2ff21ae26233705bb7b800375d0cf43e97f506408abc53760d8c6bf463f37222be3f1278f9e688c29edff9763
-
C:\Users\Admin\Desktop\TIUgSdNi27dmjlGJbc7j2X.exeFilesize
1.2MB
MD5f2c6f346247e593454a509b9e4d04ff6
SHA18986d534afe1f16571094ae0ea7da8e344250e3d
SHA256c35647e0de09fbcc92bdaabf638bacc8fc5bb0f7ac0075b1b8e149334af7f2a3
SHA51259f24343a1eb3aba043e82b0d741bb40dc2330103ccac3b480e0a56524f74b67d58c39b59f9fa92115e4f0d9e24f00d7bca0d82298263f4a8f776e6dcd20a83d
-
memory/680-148-0x0000000000000000-mapping.dmp
-
memory/680-151-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/680-154-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3044-135-0x0000000000000000-mapping.dmp
-
memory/3044-147-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3044-138-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3044-150-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3292-132-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3292-134-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3292-133-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB