Analysis
-
max time kernel
163s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 22:18
Static task
static1
Behavioral task
behavioral1
Sample
b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe
Resource
win10v2004-20221111-en
General
-
Target
b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe
-
Size
320KB
-
MD5
6d51303da26daa83864b98ec0dd5edc1
-
SHA1
b4045caba0ec3295830652210fd0b80c06033b3b
-
SHA256
b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46
-
SHA512
40e2f920b9fb31b041b7a7c8513440626c028645ebd1dd7c21c286941932071b0d420a491a9936a46445fe2dc07644f297ff0b75027110610b6a96e92d3c48e8
-
SSDEEP
6144:XTwEo1IV3puaibGKFHi0mofhaH05kipz016580bHFMdkhq86JQPDHDdx/QtqR:DCgvmzFHi0mo5aH0qMzd5807F7qPJQPx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" muaygs.exe -
Adds policy Run key to start application 2 TTPs 27 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "zunytskyusvrexsxukf.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqgogcrcvqqjtjbd.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "fypyroeqkghbmdwzu.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "zunytskyusvrexsxukf.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "fypyroeqkghbmdwzu.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "micokkdspospdxtzxoke.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "micokkdspospdxtzxoke.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "zunytskyusvrexsxukf.exe" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bytgdeyommrpezwdcurmz.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "oiakectgbyavhztxti.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bytgdeyommrpezwdcurmz.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "micokkdspospdxtzxoke.exe" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "fypyroeqkghbmdwzu.exe" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oiakectgbyavhztxti.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bytgdeyommrpezwdcurmz.exe" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqgogcrcvqqjtjbd.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "yqgogcrcvqqjtjbd.exe" muaygs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "oiakectgbyavhztxti.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\zipoxkq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oiakectgbyavhztxti.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ykuwiyhmzo = "bytgdeyommrpezwdcurmz.exe" muaygs.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" muaygs.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" muaygs.exe -
Executes dropped EXE 2 IoCs
pid Process 3896 muaygs.exe 2064 muaygs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe ." muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "yqgogcrcvqqjtjbd.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qequialshyuj = "micokkdspospdxtzxoke.exe ." muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qguaqkxgxqofnb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe" muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qguaqkxgxqofnb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe" muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oiakectgbyavhztxti.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgruhyiocsn = "bytgdeyommrpezwdcurmz.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "micokkdspospdxtzxoke.exe ." b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "fypyroeqkghbmdwzu.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bytgdeyommrpezwdcurmz.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "bytgdeyommrpezwdcurmz.exe ." b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\perwleqyogdta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oiakectgbyavhztxti.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bytgdeyommrpezwdcurmz.exe ." b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qequialshyuj = "zunytskyusvrexsxukf.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqgogcrcvqqjtjbd.exe ." b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\perwleqyogdta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\oiakectgbyavhztxti.exe ." b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qequialshyuj = "fypyroeqkghbmdwzu.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qequialshyuj = "oiakectgbyavhztxti.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe ." b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qguaqkxgxqofnb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "fypyroeqkghbmdwzu.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "bytgdeyommrpezwdcurmz.exe" muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qequialshyuj = "zunytskyusvrexsxukf.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgruhyiocsn = "zunytskyusvrexsxukf.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qguaqkxgxqofnb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe" muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qequialshyuj = "fypyroeqkghbmdwzu.exe ." muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "fypyroeqkghbmdwzu.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "oiakectgbyavhztxti.exe ." b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "bytgdeyommrpezwdcurmz.exe ." muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qguaqkxgxqofnb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\micokkdspospdxtzxoke.exe" muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\micokkdspospdxtzxoke.exe ." muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "yqgogcrcvqqjtjbd.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\perwleqyogdta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgruhyiocsn = "micokkdspospdxtzxoke.exe" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgruhyiocsn = "yqgogcrcvqqjtjbd.exe" muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qequialshyuj = "micokkdspospdxtzxoke.exe ." b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qguaqkxgxqofnb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqgogcrcvqqjtjbd.exe" muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe" muaygs.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "oiakectgbyavhztxti.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "micokkdspospdxtzxoke.exe ." muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "yqgogcrcvqqjtjbd.exe ." muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\micokkdspospdxtzxoke.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\perwleqyogdta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bytgdeyommrpezwdcurmz.exe ." muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "oiakectgbyavhztxti.exe ." muaygs.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "micokkdspospdxtzxoke.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qguaqkxgxqofnb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe" muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oyggqelo = "yqgogcrcvqqjtjbd.exe" muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgruhyiocsn = "oiakectgbyavhztxti.exe" muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fqzalaimy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yqgogcrcvqqjtjbd.exe ." muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\perwleqyogdta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bytgdeyommrpezwdcurmz.exe ." b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\perwleqyogdta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zunytskyusvrexsxukf.exe ." muaygs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\perwleqyogdta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fypyroeqkghbmdwzu.exe ." muaygs.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run muaygs.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce muaygs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgruhyiocsn = "bytgdeyommrpezwdcurmz.exe" muaygs.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" muaygs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" muaygs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA muaygs.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 www.showmyipaddress.com 52 whatismyipaddress.com 89 whatismyip.everdot.org -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\binkrcggoynvuzgxgipuryjnnvf.cbg muaygs.exe File opened for modification C:\Windows\SysWOW64\yqgogcrcvqqjtjbdxkcsasodohccvfvnpjwoem.apa muaygs.exe File created C:\Windows\SysWOW64\yqgogcrcvqqjtjbdxkcsasodohccvfvnpjwoem.apa muaygs.exe File opened for modification C:\Windows\SysWOW64\binkrcggoynvuzgxgipuryjnnvf.cbg muaygs.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\binkrcggoynvuzgxgipuryjnnvf.cbg muaygs.exe File created C:\Program Files (x86)\binkrcggoynvuzgxgipuryjnnvf.cbg muaygs.exe File opened for modification C:\Program Files (x86)\yqgogcrcvqqjtjbdxkcsasodohccvfvnpjwoem.apa muaygs.exe File created C:\Program Files (x86)\yqgogcrcvqqjtjbdxkcsasodohccvfvnpjwoem.apa muaygs.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\binkrcggoynvuzgxgipuryjnnvf.cbg muaygs.exe File created C:\Windows\binkrcggoynvuzgxgipuryjnnvf.cbg muaygs.exe File opened for modification C:\Windows\yqgogcrcvqqjtjbdxkcsasodohccvfvnpjwoem.apa muaygs.exe File created C:\Windows\yqgogcrcvqqjtjbdxkcsasodohccvfvnpjwoem.apa muaygs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings muaygs.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe 3896 muaygs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2064 muaygs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3896 muaygs.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3896 4912 b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe 84 PID 4912 wrote to memory of 3896 4912 b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe 84 PID 4912 wrote to memory of 3896 4912 b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe 84 PID 4912 wrote to memory of 2064 4912 b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe 85 PID 4912 wrote to memory of 2064 4912 b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe 85 PID 4912 wrote to memory of 2064 4912 b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe 85 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" muaygs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" muaygs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" muaygs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" muaygs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" muaygs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" muaygs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe"C:\Users\Admin\AppData\Local\Temp\b37300bd4673374262ba3896838467c649976d657e4a047f40037d9a124a9e46.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\muaygs.exe"C:\Users\Admin\AppData\Local\Temp\muaygs.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\muaygs.exe"C:\Users\Admin\AppData\Local\Temp\muaygs.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:2064
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD52a72999eaffe6e607b5ebfb0f5238092
SHA192fc361f79ea418b3105c8a1e08521e8274440fc
SHA2565fe4071bfae1fc99d9dd90af9c16a5cafbdb6d129fd3ea9864595f44f8dbb335
SHA512e48666147d8dc70e12078f92e816917af6ab9ea0ce7e6eb170a17b495d3a6bf24ad3f6c9e0e5c6690883bf114dbba2418d7306e8debded31ccae73e8d442e65a
-
Filesize
704KB
MD52a72999eaffe6e607b5ebfb0f5238092
SHA192fc361f79ea418b3105c8a1e08521e8274440fc
SHA2565fe4071bfae1fc99d9dd90af9c16a5cafbdb6d129fd3ea9864595f44f8dbb335
SHA512e48666147d8dc70e12078f92e816917af6ab9ea0ce7e6eb170a17b495d3a6bf24ad3f6c9e0e5c6690883bf114dbba2418d7306e8debded31ccae73e8d442e65a
-
Filesize
704KB
MD52a72999eaffe6e607b5ebfb0f5238092
SHA192fc361f79ea418b3105c8a1e08521e8274440fc
SHA2565fe4071bfae1fc99d9dd90af9c16a5cafbdb6d129fd3ea9864595f44f8dbb335
SHA512e48666147d8dc70e12078f92e816917af6ab9ea0ce7e6eb170a17b495d3a6bf24ad3f6c9e0e5c6690883bf114dbba2418d7306e8debded31ccae73e8d442e65a