Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe
Resource
win10v2004-20221111-en
General
-
Target
c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe
-
Size
556KB
-
MD5
f0039c9f1087c3fed31648bf39a71d7c
-
SHA1
1c7090581e7ee33f016e001cef38a3f383d0f7f8
-
SHA256
c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
-
SHA512
9cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
SSDEEP
12288:X6bvdl0zCB8EDItMTzwg7lMQsvNuqZBRbZEYTwdD7IjLgnx:4vdezCByqTtlMQsFuqzRbzI7Iy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" pmwdlo.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" pmwdlo.exe -
Adds policy Run key to start application 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqclvajt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqpliawtjdqiojambtsed.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wynzmugtzjm = "rawpjyrlypzorjxgsh.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqclvajt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmjdyoidrjukohwgtjg.exe" gokvcejrqyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wynzmugtzjm = "eqpliawtjdqiojambtsed.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqclvajt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rawpjyrlypzorjxgsh.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wynzmugtzjm = "paytpgbxmfrinhxiwnlw.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wynzmugtzjm = "paytpgbxmfrinhxiwnlw.exe" gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wynzmugtzjm = "cmjdyoidrjukohwgtjg.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqclvajt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paytpgbxmfrinhxiwnlw.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wynzmugtzjm = "eqpliawtjdqiojambtsed.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wynzmugtzjm = "bictlyphshpcdtfm.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wynzmugtzjm = "cmjdyoidrjukohwgtjg.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqclvajt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bictlyphshpcdtfm.exe" pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wynzmugtzjm = "bictlyphshpcdtfm.exe" pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqclvajt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqldwkcvhxguwnait.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqclvajt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rawpjyrlypzorjxgsh.exe" pmwdlo.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pmwdlo.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gokvcejrqyu.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pmwdlo.exe -
Executes dropped EXE 3 IoCs
pid Process 1968 gokvcejrqyu.exe 1528 pmwdlo.exe 1792 pmwdlo.exe -
Loads dropped DLL 6 IoCs
pid Process 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1968 gokvcejrqyu.exe 1968 gokvcejrqyu.exe 1968 gokvcejrqyu.exe 1968 gokvcejrqyu.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wcvlcoevftammbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bictlyphshpcdtfm.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "bictlyphshpcdtfm.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyqfvgvluhnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bictlyphshpcdtfm.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "paytpgbxmfrinhxiwnlw.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyqfvgvluhnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmjdyoidrjukohwgtjg.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\swnbqaodlxcmk = "iqldwkcvhxguwnait.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wcvlcoevftammbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqpliawtjdqiojambtsed.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "iqldwkcvhxguwnait.exe" pmwdlo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmjdyoidrjukohwgtjg.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "iqldwkcvhxguwnait.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "bictlyphshpcdtfm.exe ." gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "iqldwkcvhxguwnait.exe" pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\twmznwjxeptc = "cmjdyoidrjukohwgtjg.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "eqpliawtjdqiojambtsed.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "rawpjyrlypzorjxgsh.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqldwkcvhxguwnait.exe ." pmwdlo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paytpgbxmfrinhxiwnlw.exe" gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqpliawtjdqiojambtsed.exe ." gokvcejrqyu.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "rawpjyrlypzorjxgsh.exe" pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\twmznwjxeptc = "eqpliawtjdqiojambtsed.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wcvlcoevftammbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqldwkcvhxguwnait.exe" pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wcvlcoevftammbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rawpjyrlypzorjxgsh.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyqfvgvluhnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paytpgbxmfrinhxiwnlw.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqpliawtjdqiojambtsed.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyqfvgvluhnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rawpjyrlypzorjxgsh.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\swnbqaodlxcmk = "paytpgbxmfrinhxiwnlw.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rawpjyrlypzorjxgsh.exe" pmwdlo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\swnbqaodlxcmk = "bictlyphshpcdtfm.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyqfvgvluhnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmjdyoidrjukohwgtjg.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "bictlyphshpcdtfm.exe" pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paytpgbxmfrinhxiwnlw.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "bictlyphshpcdtfm.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyqfvgvluhnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bictlyphshpcdtfm.exe ." gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "rawpjyrlypzorjxgsh.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\twmznwjxeptc = "rawpjyrlypzorjxgsh.exe" pmwdlo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rawpjyrlypzorjxgsh.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\swnbqaodlxcmk = "rawpjyrlypzorjxgsh.exe ." pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "eqpliawtjdqiojambtsed.exe" pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce pmwdlo.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyqfvgvluhnyxl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqldwkcvhxguwnait.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\twmznwjxeptc = "iqldwkcvhxguwnait.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "cmjdyoidrjukohwgtjg.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "iqldwkcvhxguwnait.exe" gokvcejrqyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "iqldwkcvhxguwnait.exe ." pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wcvlcoevftammbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqldwkcvhxguwnait.exe" gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\twmznwjxeptc = "eqpliawtjdqiojambtsed.exe" gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\swnbqaodlxcmk = "paytpgbxmfrinhxiwnlw.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bictlyphshpcdtfm.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\swnbqaodlxcmk = "cmjdyoidrjukohwgtjg.exe ." gokvcejrqyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqldwkcvhxguwnait.exe" pmwdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wcvlcoevftammbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqldwkcvhxguwnait.exe" pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bictlyphshpcdtfm.exe" pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bcqbnufrwf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmjdyoidrjukohwgtjg.exe ." pmwdlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\iivfqwgrv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmjdyoidrjukohwgtjg.exe" pmwdlo.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pmwdlo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pmwdlo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gokvcejrqyu.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 whatismyipaddress.com 2 www.showmyipaddress.com 5 whatismyip.everdot.org -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\bictlyphshpcdtfm.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\rawpjyrlypzorjxgsh.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\paytpgbxmfrinhxiwnlw.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\eqpliawtjdqiojambtsed.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\bcqbnufrwfhojtzaelzaozlsdpudfmhr.ycj pmwdlo.exe File opened for modification C:\Windows\SysWOW64\eqpliawtjdqiojambtsed.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\rawpjyrlypzorjxgsh.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\viifdwtridrkrnfsibbool.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\bictlyphshpcdtfm.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\cmjdyoidrjukohwgtjg.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\iqldwkcvhxguwnait.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\cmjdyoidrjukohwgtjg.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\viifdwtridrkrnfsibbool.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\rawpjyrlypzorjxgsh.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\cmjdyoidrjukohwgtjg.exe pmwdlo.exe File created C:\Windows\SysWOW64\gwzzawwxrpgcmlgwploeh.iee pmwdlo.exe File created C:\Windows\SysWOW64\bcqbnufrwfhojtzaelzaozlsdpudfmhr.ycj pmwdlo.exe File opened for modification C:\Windows\SysWOW64\iqldwkcvhxguwnait.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\viifdwtridrkrnfsibbool.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\gwzzawwxrpgcmlgwploeh.iee pmwdlo.exe File opened for modification C:\Windows\SysWOW64\paytpgbxmfrinhxiwnlw.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\eqpliawtjdqiojambtsed.exe gokvcejrqyu.exe File opened for modification C:\Windows\SysWOW64\bictlyphshpcdtfm.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\iqldwkcvhxguwnait.exe pmwdlo.exe File opened for modification C:\Windows\SysWOW64\paytpgbxmfrinhxiwnlw.exe pmwdlo.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\gwzzawwxrpgcmlgwploeh.iee pmwdlo.exe File created C:\Program Files (x86)\gwzzawwxrpgcmlgwploeh.iee pmwdlo.exe File opened for modification C:\Program Files (x86)\bcqbnufrwfhojtzaelzaozlsdpudfmhr.ycj pmwdlo.exe File created C:\Program Files (x86)\bcqbnufrwfhojtzaelzaozlsdpudfmhr.ycj pmwdlo.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\bictlyphshpcdtfm.exe pmwdlo.exe File opened for modification C:\Windows\iqldwkcvhxguwnait.exe pmwdlo.exe File opened for modification C:\Windows\paytpgbxmfrinhxiwnlw.exe pmwdlo.exe File opened for modification C:\Windows\rawpjyrlypzorjxgsh.exe gokvcejrqyu.exe File opened for modification C:\Windows\cmjdyoidrjukohwgtjg.exe gokvcejrqyu.exe File opened for modification C:\Windows\viifdwtridrkrnfsibbool.exe pmwdlo.exe File opened for modification C:\Windows\eqpliawtjdqiojambtsed.exe pmwdlo.exe File opened for modification C:\Windows\gwzzawwxrpgcmlgwploeh.iee pmwdlo.exe File opened for modification C:\Windows\bcqbnufrwfhojtzaelzaozlsdpudfmhr.ycj pmwdlo.exe File opened for modification C:\Windows\iqldwkcvhxguwnait.exe gokvcejrqyu.exe File opened for modification C:\Windows\eqpliawtjdqiojambtsed.exe gokvcejrqyu.exe File opened for modification C:\Windows\rawpjyrlypzorjxgsh.exe pmwdlo.exe File opened for modification C:\Windows\paytpgbxmfrinhxiwnlw.exe pmwdlo.exe File opened for modification C:\Windows\cmjdyoidrjukohwgtjg.exe pmwdlo.exe File opened for modification C:\Windows\viifdwtridrkrnfsibbool.exe pmwdlo.exe File created C:\Windows\gwzzawwxrpgcmlgwploeh.iee pmwdlo.exe File opened for modification C:\Windows\bictlyphshpcdtfm.exe gokvcejrqyu.exe File opened for modification C:\Windows\viifdwtridrkrnfsibbool.exe gokvcejrqyu.exe File opened for modification C:\Windows\iqldwkcvhxguwnait.exe pmwdlo.exe File opened for modification C:\Windows\cmjdyoidrjukohwgtjg.exe pmwdlo.exe File opened for modification C:\Windows\eqpliawtjdqiojambtsed.exe pmwdlo.exe File created C:\Windows\bcqbnufrwfhojtzaelzaozlsdpudfmhr.ycj pmwdlo.exe File opened for modification C:\Windows\paytpgbxmfrinhxiwnlw.exe gokvcejrqyu.exe File opened for modification C:\Windows\bictlyphshpcdtfm.exe pmwdlo.exe File opened for modification C:\Windows\rawpjyrlypzorjxgsh.exe pmwdlo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1528 pmwdlo.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1528 pmwdlo.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1528 pmwdlo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1968 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 26 PID 1488 wrote to memory of 1968 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 26 PID 1488 wrote to memory of 1968 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 26 PID 1488 wrote to memory of 1968 1488 c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe 26 PID 1968 wrote to memory of 1528 1968 gokvcejrqyu.exe 27 PID 1968 wrote to memory of 1528 1968 gokvcejrqyu.exe 27 PID 1968 wrote to memory of 1528 1968 gokvcejrqyu.exe 27 PID 1968 wrote to memory of 1528 1968 gokvcejrqyu.exe 27 PID 1968 wrote to memory of 1792 1968 gokvcejrqyu.exe 28 PID 1968 wrote to memory of 1792 1968 gokvcejrqyu.exe 28 PID 1968 wrote to memory of 1792 1968 gokvcejrqyu.exe 28 PID 1968 wrote to memory of 1792 1968 gokvcejrqyu.exe 28 -
System policy modification 1 TTPs 30 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gokvcejrqyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gokvcejrqyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gokvcejrqyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" pmwdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" pmwdlo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" pmwdlo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe"C:\Users\Admin\AppData\Local\Temp\c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\gokvcejrqyu.exe"C:\Users\Admin\AppData\Local\Temp\gokvcejrqyu.exe" "c:\users\admin\appdata\local\temp\c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\pmwdlo.exe"C:\Users\Admin\AppData\Local\Temp\pmwdlo.exe" "-C:\Users\Admin\AppData\Local\Temp\bictlyphshpcdtfm.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\pmwdlo.exe"C:\Users\Admin\AppData\Local\Temp\pmwdlo.exe" "-C:\Users\Admin\AppData\Local\Temp\bictlyphshpcdtfm.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1792
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
320KB
MD589ec3461ef4a893428c32f89de78b396
SHA18067cdc0901f0dc5bc1bb67a1c9037f502ea85f9
SHA2561849989ee704cda3b552b5021f3165012978d26d0daf7d22a09805deb6be2d0b
SHA5127804fa36e1f050115b00d21a9a94cf92436260a385da67106b0c73eb350abafca53f2dec42d377d4eccc095dd75ac92e841fb66e874e656e412cd71ed7909fe8
-
Filesize
320KB
MD589ec3461ef4a893428c32f89de78b396
SHA18067cdc0901f0dc5bc1bb67a1c9037f502ea85f9
SHA2561849989ee704cda3b552b5021f3165012978d26d0daf7d22a09805deb6be2d0b
SHA5127804fa36e1f050115b00d21a9a94cf92436260a385da67106b0c73eb350abafca53f2dec42d377d4eccc095dd75ac92e841fb66e874e656e412cd71ed7909fe8
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
712KB
MD51e5f84c10958894c8aa393b9f21b54ef
SHA1d9c2985827d77986ccb247fed16179e9ff127de5
SHA256fdf68930b542ff697db19d730ce49c38f798fa87aa03632af605f7683c3fa948
SHA51270641f22737c617760eddd9f6a2af6e31bc1fd3d3e0d771ab2e8e80519ca75a8888029aea5cb6d04eaa65102d538e4be7e2e0be11d6e59a5cac17c1e6d7ed65a
-
Filesize
712KB
MD51e5f84c10958894c8aa393b9f21b54ef
SHA1d9c2985827d77986ccb247fed16179e9ff127de5
SHA256fdf68930b542ff697db19d730ce49c38f798fa87aa03632af605f7683c3fa948
SHA51270641f22737c617760eddd9f6a2af6e31bc1fd3d3e0d771ab2e8e80519ca75a8888029aea5cb6d04eaa65102d538e4be7e2e0be11d6e59a5cac17c1e6d7ed65a
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
556KB
MD5f0039c9f1087c3fed31648bf39a71d7c
SHA11c7090581e7ee33f016e001cef38a3f383d0f7f8
SHA256c7729bf3060b55c76e0b85ead974496a2f14555691162fbbc509f3f612c67458
SHA5129cd088e69a3a919b2ae98dc43d9c441e6adda7bd335019ebdb066f8dad8b1598fc099b5514ad4b7a42496170dc2a5f6d761b4e1c04326c06a3f9d9552d0e7ae6
-
Filesize
320KB
MD589ec3461ef4a893428c32f89de78b396
SHA18067cdc0901f0dc5bc1bb67a1c9037f502ea85f9
SHA2561849989ee704cda3b552b5021f3165012978d26d0daf7d22a09805deb6be2d0b
SHA5127804fa36e1f050115b00d21a9a94cf92436260a385da67106b0c73eb350abafca53f2dec42d377d4eccc095dd75ac92e841fb66e874e656e412cd71ed7909fe8
-
Filesize
320KB
MD589ec3461ef4a893428c32f89de78b396
SHA18067cdc0901f0dc5bc1bb67a1c9037f502ea85f9
SHA2561849989ee704cda3b552b5021f3165012978d26d0daf7d22a09805deb6be2d0b
SHA5127804fa36e1f050115b00d21a9a94cf92436260a385da67106b0c73eb350abafca53f2dec42d377d4eccc095dd75ac92e841fb66e874e656e412cd71ed7909fe8
-
Filesize
712KB
MD51e5f84c10958894c8aa393b9f21b54ef
SHA1d9c2985827d77986ccb247fed16179e9ff127de5
SHA256fdf68930b542ff697db19d730ce49c38f798fa87aa03632af605f7683c3fa948
SHA51270641f22737c617760eddd9f6a2af6e31bc1fd3d3e0d771ab2e8e80519ca75a8888029aea5cb6d04eaa65102d538e4be7e2e0be11d6e59a5cac17c1e6d7ed65a
-
Filesize
712KB
MD51e5f84c10958894c8aa393b9f21b54ef
SHA1d9c2985827d77986ccb247fed16179e9ff127de5
SHA256fdf68930b542ff697db19d730ce49c38f798fa87aa03632af605f7683c3fa948
SHA51270641f22737c617760eddd9f6a2af6e31bc1fd3d3e0d771ab2e8e80519ca75a8888029aea5cb6d04eaa65102d538e4be7e2e0be11d6e59a5cac17c1e6d7ed65a
-
Filesize
712KB
MD51e5f84c10958894c8aa393b9f21b54ef
SHA1d9c2985827d77986ccb247fed16179e9ff127de5
SHA256fdf68930b542ff697db19d730ce49c38f798fa87aa03632af605f7683c3fa948
SHA51270641f22737c617760eddd9f6a2af6e31bc1fd3d3e0d771ab2e8e80519ca75a8888029aea5cb6d04eaa65102d538e4be7e2e0be11d6e59a5cac17c1e6d7ed65a
-
Filesize
712KB
MD51e5f84c10958894c8aa393b9f21b54ef
SHA1d9c2985827d77986ccb247fed16179e9ff127de5
SHA256fdf68930b542ff697db19d730ce49c38f798fa87aa03632af605f7683c3fa948
SHA51270641f22737c617760eddd9f6a2af6e31bc1fd3d3e0d771ab2e8e80519ca75a8888029aea5cb6d04eaa65102d538e4be7e2e0be11d6e59a5cac17c1e6d7ed65a