Analysis
-
max time kernel
52s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe
-
Size
1.3MB
-
MD5
4117f56ac629281c8e7e53271c1cc427
-
SHA1
5e0bb27eb2c759f927c9649949b20cb8ee3cb970
-
SHA256
f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9
-
SHA512
bdab445cab9f23603d77512910a7e5e02532fc24f18ba2f6826563a9a85e2043781e63a3b1b110a4f3845519844ef04a61bc59a9863a400cda89d3271e150600
-
SSDEEP
3072:aSsvihLlTQz9z71iURo2SJJmY6uFNcgifDbmeTXwVdBR:rsqhJMxzJiU5SeLmNSbmebW1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
iybCZ9aDN.exedescription pid process target process PID 1488 created 580 1488 iybCZ9aDN.exe svchost.exe -
Adds policy Run key to start application 2 TTPs 7 IoCs
Processes:
f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exeiybCZ9aDN.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\History\\Hi6zMYAYi4P1NyMqqwCWHAivX8cECJSpY5AZNYMFQAoBk2TFmmMBvY5knVnRwxTvFGkunc.exe\" O" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Mozilla\\Firefox\\Profiles\\4gq1sglk.default-release\\thumbnails\\IiSGUrCCXRc2VUS0tPgJRfcU836vdTIJOJU92xfNOxIj1A9KcDIVSd.exe\" O" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\ZFtRd94WHf42VV8sRDKuWzKB4LtUQX3x9PNrKrgC3Uodk67PqGrFkNAoC7XSrOgcpK.exe\" O" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iybCZ9aDN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{7DAD0258-515C-3DD4-8964-BD714199E0F7}v12.0.40660\\packages\\QxRwKeqUZMbqnX94sesHD2dFIWRsvVhvis1dD.exe\" O" iybCZ9aDN.exe -
Executes dropped EXE 2 IoCs
Processes:
iybCZ9aDN.exeiybCZ9aDN.exepid process 1488 iybCZ9aDN.exe 1512 iybCZ9aDN.exe -
Sets file execution options in registry 2 TTPs 8 IoCs
Processes:
iybCZ9aDN.exeiybCZ9aDN.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe iybCZ9aDN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " iybCZ9aDN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe iybCZ9aDN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " iybCZ9aDN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe iybCZ9aDN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = " " iybCZ9aDN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe iybCZ9aDN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = " " iybCZ9aDN.exe -
Loads dropped DLL 3 IoCs
Processes:
gpscript.exeiybCZ9aDN.exepid process 1356 gpscript.exe 1356 gpscript.exe 1488 iybCZ9aDN.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 60 IoCs
Processes:
f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exeiybCZ9aDN.exegpscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\SharePoint\\x0BO4dntjk4180.exe\" O 2>NUL" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000102d4eb4e400d901 iybCZ9aDN.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Microsoft Office\\iakmR4usVIX2CXY7XrZXeR3n4BVjVxDTZzh4X86WGeFV.exe\" O 2>NUL" iybCZ9aDN.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached gpscript.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\26\\lk8j46FnttF98NVcIy9KlfM.exe\" O 2>NUL" iybCZ9aDN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\OzKx18TbFSYYHWyA7oeSJ6K9vzEYlte3k7xTkSOzeMd71slvu6Z.exe\" O 2>NUL" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows Mail\\Backup\\new\\Bwo3LgMsp381CRSNfIfStB6snA2sSdp3C0Z3JVP.exe\" O" iybCZ9aDN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached iybCZ9aDN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\eHome\\YiGFT2IZzl9PZI1vWXcuR3WUjLx0gOfQPPgzWRtJbgqsh.exe\" O" iybCZ9aDN.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 iybCZ9aDN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." iybCZ9aDN.exe Key created \REGISTRY\USER\.DEFAULT f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Windows Defender\\Scans\\History\\Service\\gfcMnGD5eOuscqwRjVjGnNjj63ITckqG2Ud0sGKTeO1rz.exe\" O" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\LocalLow\\Sun\\Java\\Deployment\\cache\\6.0\\29\\NXX9SqESu1F1hDjwtXt9FwEUQC1NUYR9EDX6Vs0.exe\" O 2>NUL" iybCZ9aDN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iybCZ9aDN.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Storage\\ext\\gfdkimpbcpahaombhbimeihdjnejgicl\\def\\taGpsAHbot99.exe\" O" iybCZ9aDN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000d05892b1e400d901 gpscript.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Feeds Cache\\MEXCZ5HN\\YQppS1LYR8mD.exe\" O 2>NUL" iybCZ9aDN.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Command Processor iybCZ9aDN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}v11.0.61030\\KgK7nG5IuHBqnXo5w9vXKkxg2sBn4kxw51HnemADjFFFUf5BHmT.exe\" O" iybCZ9aDN.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Projects\\SystemIndex\\SecStore\\X26wsqLn4cORagCCezwNVAvGB17uPgw7qhDTJItLt2wl.exe\" O" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor iybCZ9aDN.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Search\\Data\\Applications\\Windows\\Projects\\SystemIndex\\iwCKYWUAhwBEKn6O.exe\" O 2>NUL" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\GPUCache\\NkDEYtmpBnNbLRbkU9xu3LpAo4OLWXHPHl4D6ln647y2HfQgiIAm7EmmjbyAmvOka3Mu.exe\" O" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%systemroot%\system32\windowspowershell\v1.0\powershell.exe",-111 = "Performs object-based (command-line) functions" iybCZ9aDN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Printer Shortcuts\\uWl7TqtiqOhc.exe\" O 2>NUL" iybCZ9aDN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Feeds\\ZTAbjbQ4A3Z6xvPyTWsZdgU34ixvIWgHCq6vnyn3E7ye0ZEMMAxXKzElj5mOgllKAzD.exe\" O" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor iybCZ9aDN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iybCZ9aDN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-738 = "Start Internet Explorer without ActiveX controls or browser extensions." iybCZ9aDN.exe Key created \REGISTRY\USER\S-1-5-19 f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Printer Shortcuts\\K5a2gdpJLz5xD2e3uliH42gTWSXeNbn76XXtox.exe\" O" iybCZ9aDN.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iybCZ9aDN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Adobe\\7cShZBl3ynHZMyCvImfcAr05lUaJjA0CdsZGezTnX.exe\" O 2>NUL" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-20 f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe -
Modifies registry class 12 IoCs
Processes:
f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "\"C:\\ProgramData\\Package Cache\\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\\packages\\vcRuntimeAdditional_amd64\\7MaRCyEmbP5OhTPZML9POdfNNufg8a4v1.exe\" O" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Command Processor\AutoRun = "\"C:\\ProgramData\\Microsoft\\Crypto\\RSA\\Vr5BImR6pUJtlyy2mCXiotIwUmQWJrjZisqv5OeYy6QM4m2uQCHCC.exe\" O 2>NUL" f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Command Processor f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\SOFTWARE\Microsoft\Windows\CurrentVersion f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\SOFTWARE\Microsoft\Command Processor f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
iybCZ9aDN.exepid process 1512 iybCZ9aDN.exe 1512 iybCZ9aDN.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exeAUDIODG.EXEiybCZ9aDN.exeiybCZ9aDN.exedescription pid process Token: SeBackupPrivilege 1812 f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Token: SeRestorePrivilege 1812 f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Token: SeShutdownPrivilege 1812 f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe Token: 33 756 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 756 AUDIODG.EXE Token: 33 756 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 756 AUDIODG.EXE Token: SeDebugPrivilege 1488 iybCZ9aDN.exe Token: SeRestorePrivilege 1488 iybCZ9aDN.exe Token: SeDebugPrivilege 1512 iybCZ9aDN.exe Token: SeRestorePrivilege 1512 iybCZ9aDN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
gpscript.exeiybCZ9aDN.exedescription pid process target process PID 1356 wrote to memory of 1488 1356 gpscript.exe iybCZ9aDN.exe PID 1356 wrote to memory of 1488 1356 gpscript.exe iybCZ9aDN.exe PID 1356 wrote to memory of 1488 1356 gpscript.exe iybCZ9aDN.exe PID 1488 wrote to memory of 1512 1488 iybCZ9aDN.exe iybCZ9aDN.exe PID 1488 wrote to memory of 1512 1488 iybCZ9aDN.exe iybCZ9aDN.exe PID 1488 wrote to memory of 1512 1488 iybCZ9aDN.exe iybCZ9aDN.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:580
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exe" 22⤵
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
C:\Users\Admin\AppData\Local\Temp\f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe"C:\Users\Admin\AppData\Local\Temp\f958e0e50007bfb5dc366a7cb1c1815d0eb9f50a139ef0dd6fb7e22669d48fe9.exe"1⤵
- Adds policy Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1868
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4881⤵
- Suspicious use of AdjustPrivilegeToken
PID:756
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1096
-
C:\Windows\system32\gpscript.exegpscript.exe /Shutdown1⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exe" 12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds policy Run key to start application
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\X26wsqLn4cORagCCezwNVAvGB17uPgw7qhDTJItLt2wl.exeFilesize
2.4MB
MD5db4e1495dbba5d0570021d425a6ba168
SHA15bc33a62192631d7775aeacc5114efc5790c6a24
SHA256646014f688adca2b6e046974a79c7af767b656722355c9da93d31dbf066cfd02
SHA5124c879682158d29bc87a542b606ad9dde9a0f435be390f72915cb6b64e07e26b2bc27fc3ee2249efe4d4083d03a87d6cf2383257e2439f929125602447f0e3c25
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\iwCKYWUAhwBEKn6O.exeFilesize
2.2MB
MD5d1ccca107d49ceaf0f3f618717fd526b
SHA194ae79332477ccdb1eb7e9ef99dc2d5d9bdaba93
SHA2565828eb7ed0cfffa6c81308e93df9b173207440fef14734c363f21619cd062160
SHA51263b5c46fcab9f0de4c01e901abdc37da384bac250aa8d360ec92681b299063ee91b092e44ff1a4257d61a6ae19bd515e94b8038da66deeebb68e1996e314fbf1
-
C:\ProgramData\Microsoft\Windows Defender\Scans\History\Service\gfcMnGD5eOuscqwRjVjGnNjj63ITckqG2Ud0sGKTeO1rz.exeFilesize
1.9MB
MD52214dbd582638db8d1ab149c20bc94df
SHA1a4b43c4b1100642b8a1bea09e156cb3035934bd7
SHA25615cd1e303a1056df81f7aa9308ceb2bd2a10fc4ce494e7e43ee4c58ed1b835a0
SHA5128b2089c6a898b6ba1758592f4bc82cf7c8b006fa5ca504f6486f70dd63c2d113ca0dd8b59b373e6ece1bbc7ef19fce7920c043af68e8fc9e6b48ac6e6ec0d36a
-
C:\ProgramData\Microsoft\Windows\DRM\mKIpcoIS7Ay4lNX.cmdFilesize
3.3MB
MD53bfe672b5fd59fb1a7b74b38125079dd
SHA1a29e2471417a0fc834d820f1321676efd1eae974
SHA2560f8923cfa748ec0f0a5b89a8a33e5fbefe3c32851bd72bf6c5b6ef1c8c1db03b
SHA51215b759deb550051b6a8a39acd9cbef52c0c84ce7c335bf4497002b1dfc94e8bee8bf302ea8c29971ddaf0f4f81e3749859223d05d5165d7cfd2fe9a9d89ffc2d
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\SharePoint\x0BO4dntjk4180.exeFilesize
2.5MB
MD52a7b74725e8098e5a99b21bac22f1c94
SHA1e075cd63fdc558a80b21bd61eab9052ebb8a2c89
SHA2565332219c40afff5ec09c5bd3a6b6a07a4db0ceac2bc9da8e556dd275603eb770
SHA512411e694539f2c9cb61e9726e6e023213f8a7000985c247858fb796612fe455bb9fb45a47e06a1b6771d33cd0ed35bdf4d2c4b26de0b148db9ffc0586cecef423
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\OzKx18TbFSYYHWyA7oeSJ6K9vzEYlte3k7xTkSOzeMd71slvu6Z.exeFilesize
1.7MB
MD5403e6bdd967ad67b4d6054169d81339e
SHA1494b1d2f7e4215e6dd73ff84ab27eb97f8b2cfd3
SHA256480df70f851e04d30826532f527a963cfc948d97ad4a6f1e4f2b38178ec344c9
SHA512254f676ae04a109ecad72be61999fdf34221d697ee835f8dee45ef4b02e6c26317101834ba7b4469ccf41fb1001d4bb86e19e2fdbc0f9a30e92fada44cd52c51
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exeFilesize
1.9MB
MD54e37b451bdb8288dc0ac4c693c3bed03
SHA17e6ef3a9957fe336ff0c97a28876b3d005a8b069
SHA2569acb7d9bc662c9d3505b72b77c77d1654df0a89f4e8d8ab8372ae3442c686d08
SHA5124ab316c118a7a4849ad901e9844590e060b00c520a899a1e3cb118d723e99566a2766945712694b64c91289a46d77e1e64a612dbd3653360b51f954689827388
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exeFilesize
1.9MB
MD54e37b451bdb8288dc0ac4c693c3bed03
SHA17e6ef3a9957fe336ff0c97a28876b3d005a8b069
SHA2569acb7d9bc662c9d3505b72b77c77d1654df0a89f4e8d8ab8372ae3442c686d08
SHA5124ab316c118a7a4849ad901e9844590e060b00c520a899a1e3cb118d723e99566a2766945712694b64c91289a46d77e1e64a612dbd3653360b51f954689827388
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exeFilesize
1.9MB
MD54e37b451bdb8288dc0ac4c693c3bed03
SHA17e6ef3a9957fe336ff0c97a28876b3d005a8b069
SHA2569acb7d9bc662c9d3505b72b77c77d1654df0a89f4e8d8ab8372ae3442c686d08
SHA5124ab316c118a7a4849ad901e9844590e060b00c520a899a1e3cb118d723e99566a2766945712694b64c91289a46d77e1e64a612dbd3653360b51f954689827388
-
C:\Users\Admin\AppData\Local\Microsoft\Feeds\ZTAbjbQ4A3Z6xvPyTWsZdgU34ixvIWgHCq6vnyn3E7ye0ZEMMAxXKzElj5mOgllKAzD.exeFilesize
2.1MB
MD5945f28b21cac2e6ed54125cdef95974b
SHA1cda867900b8ffad08fe5780d023439b6985e0c49
SHA2569f5d0f1d6c9dbac3d4ed0e162e341b9229c7c5aa7e6b5b535378aa5058bb3417
SHA5125b557e757212a4b72b2a7cde869c8aaa3ce956ed0a3f90978a9acdc971212a5644f9917967b63063e479e915418b744d3875870fc0935b167bb83b3c1ed844f1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\CSi6hnLeneOYYLl6hiqlFSSKRaM85D2xkZIQMlKUI9hS.batFilesize
3.5MB
MD5ef2039d4ca4ff86974593d88f6cfdf28
SHA1a203349209d715ec3c5cef4cf3de63d179600494
SHA256282791f1efcdf69c698f4141eac3b96bf5e9a9abff880959f5d09b4aa24a9891
SHA512f83d5b5aa16bb338de0282f5173ea621341320df44ac5e5b7c7bf595aff5a9b31b75882524e3ceb9edd8b41ba4a9804b28814396f2e41d398c374bf37262ce13
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4gq1sglk.default-release\thumbnails\IiSGUrCCXRc2VUS0tPgJRfcU836vdTIJOJU92xfNOxIj1A9KcDIVSd.exeFilesize
1.4MB
MD518cec6e8042dc3e6ecbb423a564f2adc
SHA172b51db60025d7bd3c4f6836803fa494bba3dd46
SHA256cfdc9e391831da2f25abdb6d6fe5394bc84c47dd79565a3ebe35cc0f580ac192
SHA512063d19a8fda471dfa0009a1e8b856b5d8d351f8e690ee63ab59dd0619a580cdcec2c628a8fbb3d3a2ed3fca6d9394686a0b0e1375ae4b6b9659a8df9345cbf90
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\LPWxlFsL8CKZmOPpDJKHnsCHvvZngK8h4WSlLivnuJ8oRxynFuN.exeFilesize
1.7MB
MD5485b5f99429e1a399323e5daddb51e2d
SHA13a87471b089f3d75f8abfbff0c97036ac9e2a24b
SHA256a3e5b79ebccfa380a5e7bce93cf98d896eb9ad302e6bd47231d8fa9561850675
SHA512c2273ea23e5a4a0d81322d400a1925ee24906a31b9120212c6acd998004f4715b6c30a6213b66816c3a6476127b31e88901c45380d62a41b09465cab0b1daea2
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exeFilesize
1.9MB
MD54e37b451bdb8288dc0ac4c693c3bed03
SHA17e6ef3a9957fe336ff0c97a28876b3d005a8b069
SHA2569acb7d9bc662c9d3505b72b77c77d1654df0a89f4e8d8ab8372ae3442c686d08
SHA5124ab316c118a7a4849ad901e9844590e060b00c520a899a1e3cb118d723e99566a2766945712694b64c91289a46d77e1e64a612dbd3653360b51f954689827388
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exeFilesize
1.9MB
MD54e37b451bdb8288dc0ac4c693c3bed03
SHA17e6ef3a9957fe336ff0c97a28876b3d005a8b069
SHA2569acb7d9bc662c9d3505b72b77c77d1654df0a89f4e8d8ab8372ae3442c686d08
SHA5124ab316c118a7a4849ad901e9844590e060b00c520a899a1e3cb118d723e99566a2766945712694b64c91289a46d77e1e64a612dbd3653360b51f954689827388
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\iybCZ9aDN.exeFilesize
1.9MB
MD54e37b451bdb8288dc0ac4c693c3bed03
SHA17e6ef3a9957fe336ff0c97a28876b3d005a8b069
SHA2569acb7d9bc662c9d3505b72b77c77d1654df0a89f4e8d8ab8372ae3442c686d08
SHA5124ab316c118a7a4849ad901e9844590e060b00c520a899a1e3cb118d723e99566a2766945712694b64c91289a46d77e1e64a612dbd3653360b51f954689827388
-
memory/1356-77-0x0000000000D20000-0x0000000000D4D000-memory.dmpFilesize
180KB
-
memory/1356-65-0x0000000000D20000-0x0000000000D4D000-memory.dmpFilesize
180KB
-
memory/1356-64-0x0000000000D20000-0x0000000000D4D000-memory.dmpFilesize
180KB
-
memory/1356-76-0x0000000000D20000-0x0000000000D4D000-memory.dmpFilesize
180KB
-
memory/1488-62-0x0000000000000000-mapping.dmp
-
memory/1488-78-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1488-67-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1488-82-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1512-80-0x0000000000000000-mapping.dmp
-
memory/1512-85-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1812-56-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1812-54-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1868-55-0x000007FEFBB51000-0x000007FEFBB53000-memory.dmpFilesize
8KB