Analysis
-
max time kernel
169s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe
Resource
win10v2004-20221111-en
General
-
Target
addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe
-
Size
496KB
-
MD5
6fef4e3d376d32a3d3986a4d7e5311e0
-
SHA1
2edefaa70875be5f7306dd37ec8594c7760a1111
-
SHA256
addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
-
SHA512
bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
SSDEEP
6144:Sj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionup+:A6onxOp8FySpE5zvIdtU+Ymef5
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xsglwjgvhcq.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ebmpw.exe -
Adds policy Run key to start application 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "bjftlckaviggzjzr.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "cnmdysdwuklokxqlqng.exe" ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "pbbtpkwqpgimjxrntrlx.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "rbzpjcmebqqsnzrlpl.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bdtbnyakzg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rbzpjcmebqqsnzrlpl.exe" ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "pbbtpkwqpgimjxrntrlx.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bdtbnyakzg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\irodwoxokyxysdunq.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bdtbnyakzg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rbzpjcmebqqsnzrlpl.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bdtbnyakzg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ersliermmehmkzuryxsfg.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bdtbnyakzg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bjftlckaviggzjzr.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bdtbnyakzg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\irodwoxokyxysdunq.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bdtbnyakzg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbbtpkwqpgimjxrntrlx.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bdtbnyakzg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\irodwoxokyxysdunq.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "bjftlckaviggzjzr.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "irodwoxokyxysdunq.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "irodwoxokyxysdunq.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "ersliermmehmkzuryxsfg.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sxqbqejwoytqg = "ersliermmehmkzuryxsfg.exe" ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bdtbnyakzg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ersliermmehmkzuryxsfg.exe" ebmpw.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xsglwjgvhcq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebmpw.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebmpw.exe -
Executes dropped EXE 3 IoCs
pid Process 4384 xsglwjgvhcq.exe 3916 ebmpw.exe 3744 ebmpw.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation xsglwjgvhcq.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\irodwoxokyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ersliermmehmkzuryxsfg.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cnmdysdwuklokxqlqng.exe ." ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tztfvkqexiectb = "ersliermmehmkzuryxsfg.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tztfvkqexiectb = "bjftlckaviggzjzr.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\irodwoxokyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\irodwoxokyxysdunq.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "cnmdysdwuklokxqlqng.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bjftlckaviggzjzr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ersliermmehmkzuryxsfg.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bjftlckaviggzjzr.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\irodwoxokyxysdunq.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "ersliermmehmkzuryxsfg.exe ." ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "ersliermmehmkzuryxsfg.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wdylcszoiurqirg = "rbzpjcmebqqsnzrlpl.exe ." ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bjftlckaviggzjzr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbbtpkwqpgimjxrntrlx.exe ." ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "rbzpjcmebqqsnzrlpl.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "pbbtpkwqpgimjxrntrlx.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ersliermmehmkzuryxsfg.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "irodwoxokyxysdunq.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tztfvkqexiectb = "irodwoxokyxysdunq.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\irodwoxokyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ersliermmehmkzuryxsfg.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ersliermmehmkzuryxsfg.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "bjftlckaviggzjzr.exe" ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ebmpw.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bjftlckaviggzjzr.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bjftlckaviggzjzr.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wdylcszoiurqirg = "bjftlckaviggzjzr.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ersliermmehmkzuryxsfg.exe" ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tztfvkqexiectb = "cnmdysdwuklokxqlqng.exe" xsglwjgvhcq.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tztfvkqexiectb = "pbbtpkwqpgimjxrntrlx.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\irodwoxokyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bjftlckaviggzjzr.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbbtpkwqpgimjxrntrlx.exe ." ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\irodwoxokyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cnmdysdwuklokxqlqng.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "bjftlckaviggzjzr.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tztfvkqexiectb = "pbbtpkwqpgimjxrntrlx.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\irodwoxokyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rbzpjcmebqqsnzrlpl.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "ersliermmehmkzuryxsfg.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wdylcszoiurqirg = "pbbtpkwqpgimjxrntrlx.exe ." ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "rbzpjcmebqqsnzrlpl.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wdylcszoiurqirg = "cnmdysdwuklokxqlqng.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rbzpjcmebqqsnzrlpl.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\irodwoxokyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbbtpkwqpgimjxrntrlx.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wdylcszoiurqirg = "ersliermmehmkzuryxsfg.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbbtpkwqpgimjxrntrlx.exe" ebmpw.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wdylcszoiurqirg = "irodwoxokyxysdunq.exe ." ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bjftlckaviggzjzr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cnmdysdwuklokxqlqng.exe ." ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "rbzpjcmebqqsnzrlpl.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tztfvkqexiectb = "rbzpjcmebqqsnzrlpl.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tztfvkqexiectb = "bjftlckaviggzjzr.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "ersliermmehmkzuryxsfg.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rbzpjcmebqqsnzrlpl.exe" ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "bjftlckaviggzjzr.exe ." xsglwjgvhcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ebmpw.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wdylcszoiurqirg = "irodwoxokyxysdunq.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\irodwoxokyxysdunq.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wdylcszoiurqirg = "cnmdysdwuklokxqlqng.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wzqzmybmckd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cnmdysdwuklokxqlqng.exe" ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cnmdysdwuklokxqlqng.exe ." ebmpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\txpznaeqhqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bjftlckaviggzjzr.exe ." ebmpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bjftlckaviggzjzr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbbtpkwqpgimjxrntrlx.exe ." ebmpw.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xsglwjgvhcq.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ebmpw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ebmpw.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 65 whatismyip.everdot.org 69 www.showmyipaddress.com 89 whatismyipaddress.com 107 whatismyip.everdot.org -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\bjftlckaviggzjzr.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\vjlfdaokleiondzxffbprl.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\bjftlckaviggzjzr.exe ebmpw.exe File created C:\Windows\SysWOW64\vrbdjokoxykyfdhndlplvxdiei.ses ebmpw.exe File opened for modification C:\Windows\SysWOW64\wdylcszoiurqirgxyrgnivmcjysebasbqhibq.sfw ebmpw.exe File opened for modification C:\Windows\SysWOW64\irodwoxokyxysdunq.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\irodwoxokyxysdunq.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\rbzpjcmebqqsnzrlpl.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\ersliermmehmkzuryxsfg.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\vjlfdaokleiondzxffbprl.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\rbzpjcmebqqsnzrlpl.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\pbbtpkwqpgimjxrntrlx.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\ersliermmehmkzuryxsfg.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\rbzpjcmebqqsnzrlpl.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\cnmdysdwuklokxqlqng.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\pbbtpkwqpgimjxrntrlx.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\ersliermmehmkzuryxsfg.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\vjlfdaokleiondzxffbprl.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\irodwoxokyxysdunq.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\cnmdysdwuklokxqlqng.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\pbbtpkwqpgimjxrntrlx.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\bjftlckaviggzjzr.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\cnmdysdwuklokxqlqng.exe ebmpw.exe File opened for modification C:\Windows\SysWOW64\vrbdjokoxykyfdhndlplvxdiei.ses ebmpw.exe File created C:\Windows\SysWOW64\wdylcszoiurqirgxyrgnivmcjysebasbqhibq.sfw ebmpw.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\vrbdjokoxykyfdhndlplvxdiei.ses ebmpw.exe File created C:\Program Files (x86)\vrbdjokoxykyfdhndlplvxdiei.ses ebmpw.exe File opened for modification C:\Program Files (x86)\wdylcszoiurqirgxyrgnivmcjysebasbqhibq.sfw ebmpw.exe File created C:\Program Files (x86)\wdylcszoiurqirgxyrgnivmcjysebasbqhibq.sfw ebmpw.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\rbzpjcmebqqsnzrlpl.exe xsglwjgvhcq.exe File opened for modification C:\Windows\rbzpjcmebqqsnzrlpl.exe ebmpw.exe File opened for modification C:\Windows\ersliermmehmkzuryxsfg.exe ebmpw.exe File opened for modification C:\Windows\bjftlckaviggzjzr.exe xsglwjgvhcq.exe File opened for modification C:\Windows\cnmdysdwuklokxqlqng.exe xsglwjgvhcq.exe File opened for modification C:\Windows\pbbtpkwqpgimjxrntrlx.exe xsglwjgvhcq.exe File opened for modification C:\Windows\pbbtpkwqpgimjxrntrlx.exe ebmpw.exe File opened for modification C:\Windows\vjlfdaokleiondzxffbprl.exe ebmpw.exe File opened for modification C:\Windows\bjftlckaviggzjzr.exe ebmpw.exe File opened for modification C:\Windows\rbzpjcmebqqsnzrlpl.exe ebmpw.exe File opened for modification C:\Windows\bjftlckaviggzjzr.exe ebmpw.exe File opened for modification C:\Windows\irodwoxokyxysdunq.exe ebmpw.exe File opened for modification C:\Windows\cnmdysdwuklokxqlqng.exe ebmpw.exe File opened for modification C:\Windows\pbbtpkwqpgimjxrntrlx.exe ebmpw.exe File created C:\Windows\vrbdjokoxykyfdhndlplvxdiei.ses ebmpw.exe File created C:\Windows\wdylcszoiurqirgxyrgnivmcjysebasbqhibq.sfw ebmpw.exe File opened for modification C:\Windows\irodwoxokyxysdunq.exe xsglwjgvhcq.exe File opened for modification C:\Windows\ersliermmehmkzuryxsfg.exe xsglwjgvhcq.exe File opened for modification C:\Windows\vjlfdaokleiondzxffbprl.exe xsglwjgvhcq.exe File opened for modification C:\Windows\irodwoxokyxysdunq.exe ebmpw.exe File opened for modification C:\Windows\cnmdysdwuklokxqlqng.exe ebmpw.exe File opened for modification C:\Windows\ersliermmehmkzuryxsfg.exe ebmpw.exe File opened for modification C:\Windows\vjlfdaokleiondzxffbprl.exe ebmpw.exe File opened for modification C:\Windows\vrbdjokoxykyfdhndlplvxdiei.ses ebmpw.exe File opened for modification C:\Windows\wdylcszoiurqirgxyrgnivmcjysebasbqhibq.sfw ebmpw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 3916 ebmpw.exe 3916 ebmpw.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3916 ebmpw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4776 wrote to memory of 4384 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 84 PID 4776 wrote to memory of 4384 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 84 PID 4776 wrote to memory of 4384 4776 addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe 84 PID 4384 wrote to memory of 3916 4384 xsglwjgvhcq.exe 85 PID 4384 wrote to memory of 3916 4384 xsglwjgvhcq.exe 85 PID 4384 wrote to memory of 3916 4384 xsglwjgvhcq.exe 85 PID 4384 wrote to memory of 3744 4384 xsglwjgvhcq.exe 86 PID 4384 wrote to memory of 3744 4384 xsglwjgvhcq.exe 86 PID 4384 wrote to memory of 3744 4384 xsglwjgvhcq.exe 86 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xsglwjgvhcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xsglwjgvhcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ebmpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ebmpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ebmpw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe"C:\Users\Admin\AppData\Local\Temp\addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe"C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe" "c:\users\admin\appdata\local\temp\addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\ebmpw.exe"C:\Users\Admin\AppData\Local\Temp\ebmpw.exe" "-C:\Users\Admin\AppData\Local\Temp\bjftlckaviggzjzr.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\ebmpw.exe"C:\Users\Admin\AppData\Local\Temp\ebmpw.exe" "-C:\Users\Admin\AppData\Local\Temp\bjftlckaviggzjzr.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:3744
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
700KB
MD5c3513d344c5963a1d40208744b1d16c6
SHA11cca159103cbd1ee1d077fb654a99628d05d76d1
SHA256829f5f233cb4d1ea22dc66561a1185367aaa55e39b8bbf8cb3fdb6cc8bc482be
SHA51280c1e25303ad092d077a9f9331447bd77252e28c98a4c25c4a6e87bc00d045eb51676c59f638854b97d3fd551379290762f7ec34805b0436ff99862e7c059c3b
-
Filesize
700KB
MD5c3513d344c5963a1d40208744b1d16c6
SHA11cca159103cbd1ee1d077fb654a99628d05d76d1
SHA256829f5f233cb4d1ea22dc66561a1185367aaa55e39b8bbf8cb3fdb6cc8bc482be
SHA51280c1e25303ad092d077a9f9331447bd77252e28c98a4c25c4a6e87bc00d045eb51676c59f638854b97d3fd551379290762f7ec34805b0436ff99862e7c059c3b
-
Filesize
700KB
MD5c3513d344c5963a1d40208744b1d16c6
SHA11cca159103cbd1ee1d077fb654a99628d05d76d1
SHA256829f5f233cb4d1ea22dc66561a1185367aaa55e39b8bbf8cb3fdb6cc8bc482be
SHA51280c1e25303ad092d077a9f9331447bd77252e28c98a4c25c4a6e87bc00d045eb51676c59f638854b97d3fd551379290762f7ec34805b0436ff99862e7c059c3b
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273
-
Filesize
496KB
MD56fef4e3d376d32a3d3986a4d7e5311e0
SHA12edefaa70875be5f7306dd37ec8594c7760a1111
SHA256addb7c8d0a129b1a63270af58024b39803e911e119383b0378def33ac4f9c38b
SHA512bbc790e35eb1e68d1c7afb5767051fcdf759a97b46cf39287e05dd6455a12303971d363bd42af335aa49b4dcba82348fb86a8172bdd1cb5be731b48eac1c5273