Analysis
-
max time kernel
189s -
max time network
208s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe
Resource
win10v2004-20221111-en
General
-
Target
5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe
-
Size
480KB
-
MD5
9859b525e857dc6a1799d182892bd8e0
-
SHA1
6ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
-
SHA256
5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
-
SHA512
00f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
SSDEEP
6144:5mXqNhOPOUFLccF/nHkcPLRFB/fhLeiNruEnOldMrhJ11PUM1nF1Wxqg:5maNhOPnxBnHkapLjTn/rhlUy1WxX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" uvlgepmyefv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yhklv.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhklv.exe -
Adds policy Run key to start application 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ndnvmyixdrhj = "wtkzxqhdqlirpsyrwqa.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cpwbpyfru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jhzpoiaxlhfposztzufd.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ndnvmyixdrhj = "lhxliaqlxrnvsuzrvo.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cpwbpyfru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wtkzxqhdqlirpsyrwqa.exe" yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run uvlgepmyefv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ndnvmyixdrhj = "cxmzvmbvgzubxyctw.exe" uvlgepmyefv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ndnvmyixdrhj = "cxmzvmbvgzubxyctw.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cpwbpyfru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhxliaqlxrnvsuzrvo.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ndnvmyixdrhj = "yxqhhcvtifeppucxeamle.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cpwbpyfru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhxliaqlxrnvsuzrvo.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cpwbpyfru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxmzvmbvgzubxyctw.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cpwbpyfru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jhzpoiaxlhfposztzufd.exe" uvlgepmyefv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ndnvmyixdrhj = "jhzpoiaxlhfposztzufd.exe" yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cpwbpyfru = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxmzvmbvgzubxyctw.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ndnvmyixdrhj = "cxmzvmbvgzubxyctw.exe" yhklv.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" uvlgepmyefv.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhklv.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhklv.exe -
Executes dropped EXE 3 IoCs
pid Process 1068 uvlgepmyefv.exe 1060 yhklv.exe 1912 yhklv.exe -
Loads dropped DLL 6 IoCs
pid Process 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1068 uvlgepmyefv.exe 1068 uvlgepmyefv.exe 1068 uvlgepmyefv.exe 1068 uvlgepmyefv.exe -
Adds Run key to start application 2 TTPs 57 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mdoxpcndkzqtl = "wtkzxqhdqlirpsyrwqa.exe" uvlgepmyefv.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mdoxpcndkzqtl = "yxqhhcvtifeppucxeamle.exe" yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wtkzxqhdqlirpsyrwqa.exe ." yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "wtkzxqhdqlirpsyrwqa.exe ." yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wtkzxqhdqlirpsyrwqa.exe" yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mdoxpcndkzqtl = "wtkzxqhdqlirpsyrwqa.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vpdpkaohrjdjeehx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxmzvmbvgzubxyctw.exe" yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mdoxpcndkzqtl = "lhxliaqlxrnvsuzrvo.exe" yhklv.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nfrbuiultjbfyw = "yxqhhcvtifeppucxeamle.exe ." yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mdoxpcndkzqtl = "vpdpkaohrjdjeehx.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "lhxliaqlxrnvsuzrvo.exe ." yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "cxmzvmbvgzubxyctw.exe ." uvlgepmyefv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "vpdpkaohrjdjeehx.exe ." yhklv.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vpdpkaohrjdjeehx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vpdpkaohrjdjeehx.exe" yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yxqhhcvtifeppucxeamle.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qjwhbqdvevotnmo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yxqhhcvtifeppucxeamle.exe ." yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wtkzxqhdqlirpsyrwqa.exe" yhklv.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce uvlgepmyefv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nfrbuiultjbfyw = "yxqhhcvtifeppucxeamle.exe ." uvlgepmyefv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vpdpkaohrjdjeehx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wtkzxqhdqlirpsyrwqa.exe" yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce uvlgepmyefv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "cxmzvmbvgzubxyctw.exe ." yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qjwhbqdvevotnmo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxmzvmbvgzubxyctw.exe ." yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxmzvmbvgzubxyctw.exe ." yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "lhxliaqlxrnvsuzrvo.exe" uvlgepmyefv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qjwhbqdvevotnmo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vpdpkaohrjdjeehx.exe ." yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cxmzvmbvgzubxyctw.exe" yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jhzpoiaxlhfposztzufd.exe" uvlgepmyefv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qjwhbqdvevotnmo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jhzpoiaxlhfposztzufd.exe ." yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nfrbuiultjbfyw = "wtkzxqhdqlirpsyrwqa.exe ." yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nfrbuiultjbfyw = "jhzpoiaxlhfposztzufd.exe ." yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yxqhhcvtifeppucxeamle.exe ." yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yxqhhcvtifeppucxeamle.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "yxqhhcvtifeppucxeamle.exe" yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "wtkzxqhdqlirpsyrwqa.exe ." yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "cxmzvmbvgzubxyctw.exe" yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jhzpoiaxlhfposztzufd.exe ." yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhxliaqlxrnvsuzrvo.exe ." yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qjwhbqdvevotnmo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yxqhhcvtifeppucxeamle.exe ." yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "lhxliaqlxrnvsuzrvo.exe ." yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\qfovlwftyla = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wtkzxqhdqlirpsyrwqa.exe ." uvlgepmyefv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nfrbuiultjbfyw = "yxqhhcvtifeppucxeamle.exe ." yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "cxmzvmbvgzubxyctw.exe" yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run uvlgepmyefv.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uvlgepmyefv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vpdpkaohrjdjeehx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jhzpoiaxlhfposztzufd.exe" uvlgepmyefv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\qjwhbqdvevotnmo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhxliaqlxrnvsuzrvo.exe ." uvlgepmyefv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run yhklv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "lhxliaqlxrnvsuzrvo.exe" yhklv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\vjrxmwervh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhxliaqlxrnvsuzrvo.exe" yhklv.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhklv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yhklv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uvlgepmyefv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhklv.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 whatismyipaddress.com 7 www.showmyipaddress.com 10 whatismyip.everdot.org -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wtkzxqhdqlirpsyrwqa.exe uvlgepmyefv.exe File opened for modification C:\Windows\SysWOW64\yxqhhcvtifeppucxeamle.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\yxqhhcvtifeppucxeamle.exe yhklv.exe File created C:\Windows\SysWOW64\mdoxpcndkzqtliivuimdoxpcndkzqtliivu.mdo yhklv.exe File opened for modification C:\Windows\SysWOW64\cxmzvmbvgzubxyctw.exe uvlgepmyefv.exe File opened for modification C:\Windows\SysWOW64\wtkzxqhdqlirpsyrwqa.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\jhzpoiaxlhfposztzufd.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\lhxliaqlxrnvsuzrvo.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\wtkzxqhdqlirpsyrwqa.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\jhzpoiaxlhfposztzufd.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\vpdpkaohrjdjeehx.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\cxmzvmbvgzubxyctw.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\ppjbcysrhffrsyhdlivvph.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\cxmzvmbvgzubxyctw.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\jhzpoiaxlhfposztzufd.exe uvlgepmyefv.exe File opened for modification C:\Windows\SysWOW64\lhxliaqlxrnvsuzrvo.exe uvlgepmyefv.exe File opened for modification C:\Windows\SysWOW64\yxqhhcvtifeppucxeamle.exe uvlgepmyefv.exe File opened for modification C:\Windows\SysWOW64\ppjbcysrhffrsyhdlivvph.exe uvlgepmyefv.exe File opened for modification C:\Windows\SysWOW64\vpdpkaohrjdjeehx.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\lhxliaqlxrnvsuzrvo.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\ppjbcysrhffrsyhdlivvph.exe yhklv.exe File opened for modification C:\Windows\SysWOW64\djjhoqqvrvbtambdrunttrya.fbf yhklv.exe File opened for modification C:\Windows\SysWOW64\vpdpkaohrjdjeehx.exe uvlgepmyefv.exe File opened for modification C:\Windows\SysWOW64\mdoxpcndkzqtliivuimdoxpcndkzqtliivu.mdo yhklv.exe File created C:\Windows\SysWOW64\djjhoqqvrvbtambdrunttrya.fbf yhklv.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\djjhoqqvrvbtambdrunttrya.fbf yhklv.exe File created C:\Program Files (x86)\djjhoqqvrvbtambdrunttrya.fbf yhklv.exe File opened for modification C:\Program Files (x86)\mdoxpcndkzqtliivuimdoxpcndkzqtliivu.mdo yhklv.exe File created C:\Program Files (x86)\mdoxpcndkzqtliivuimdoxpcndkzqtliivu.mdo yhklv.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\djjhoqqvrvbtambdrunttrya.fbf yhklv.exe File opened for modification C:\Windows\vpdpkaohrjdjeehx.exe uvlgepmyefv.exe File opened for modification C:\Windows\cxmzvmbvgzubxyctw.exe uvlgepmyefv.exe File opened for modification C:\Windows\lhxliaqlxrnvsuzrvo.exe uvlgepmyefv.exe File opened for modification C:\Windows\jhzpoiaxlhfposztzufd.exe uvlgepmyefv.exe File opened for modification C:\Windows\yxqhhcvtifeppucxeamle.exe uvlgepmyefv.exe File opened for modification C:\Windows\jhzpoiaxlhfposztzufd.exe yhklv.exe File opened for modification C:\Windows\yxqhhcvtifeppucxeamle.exe yhklv.exe File opened for modification C:\Windows\cxmzvmbvgzubxyctw.exe yhklv.exe File opened for modification C:\Windows\lhxliaqlxrnvsuzrvo.exe yhklv.exe File opened for modification C:\Windows\wtkzxqhdqlirpsyrwqa.exe yhklv.exe File opened for modification C:\Windows\mdoxpcndkzqtliivuimdoxpcndkzqtliivu.mdo yhklv.exe File opened for modification C:\Windows\ppjbcysrhffrsyhdlivvph.exe yhklv.exe File opened for modification C:\Windows\wtkzxqhdqlirpsyrwqa.exe uvlgepmyefv.exe File opened for modification C:\Windows\ppjbcysrhffrsyhdlivvph.exe uvlgepmyefv.exe File opened for modification C:\Windows\vpdpkaohrjdjeehx.exe yhklv.exe File opened for modification C:\Windows\cxmzvmbvgzubxyctw.exe yhklv.exe File opened for modification C:\Windows\lhxliaqlxrnvsuzrvo.exe yhklv.exe File opened for modification C:\Windows\wtkzxqhdqlirpsyrwqa.exe yhklv.exe File opened for modification C:\Windows\yxqhhcvtifeppucxeamle.exe yhklv.exe File opened for modification C:\Windows\ppjbcysrhffrsyhdlivvph.exe yhklv.exe File opened for modification C:\Windows\vpdpkaohrjdjeehx.exe yhklv.exe File opened for modification C:\Windows\jhzpoiaxlhfposztzufd.exe yhklv.exe File created C:\Windows\djjhoqqvrvbtambdrunttrya.fbf yhklv.exe File created C:\Windows\mdoxpcndkzqtliivuimdoxpcndkzqtliivu.mdo yhklv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1060 yhklv.exe 1060 yhklv.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1060 yhklv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1068 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 28 PID 1968 wrote to memory of 1068 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 28 PID 1968 wrote to memory of 1068 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 28 PID 1968 wrote to memory of 1068 1968 5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe 28 PID 1068 wrote to memory of 1060 1068 uvlgepmyefv.exe 29 PID 1068 wrote to memory of 1060 1068 uvlgepmyefv.exe 29 PID 1068 wrote to memory of 1060 1068 uvlgepmyefv.exe 29 PID 1068 wrote to memory of 1060 1068 uvlgepmyefv.exe 29 PID 1068 wrote to memory of 1912 1068 uvlgepmyefv.exe 30 PID 1068 wrote to memory of 1912 1068 uvlgepmyefv.exe 30 PID 1068 wrote to memory of 1912 1068 uvlgepmyefv.exe 30 PID 1068 wrote to memory of 1912 1068 uvlgepmyefv.exe 30 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" uvlgepmyefv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uvlgepmyefv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer uvlgepmyefv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yhklv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yhklv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhklv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe"C:\Users\Admin\AppData\Local\Temp\5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\uvlgepmyefv.exe"C:\Users\Admin\AppData\Local\Temp\uvlgepmyefv.exe" "c:\users\admin\appdata\local\temp\5fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\yhklv.exe"C:\Users\Admin\AppData\Local\Temp\yhklv.exe" "-C:\Users\Admin\AppData\Local\Temp\vpdpkaohrjdjeehx.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\yhklv.exe"C:\Users\Admin\AppData\Local\Temp\yhklv.exe" "-C:\Users\Admin\AppData\Local\Temp\vpdpkaohrjdjeehx.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1912
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
320KB
MD550d9d27cb559210ef15a86c687492a84
SHA18dce0f57a7306bc3b60fb38800e24d9250c013ea
SHA2568d737898ca006438655f65f37c8fc2edf3cac42c80a871d0b5f32c2aba88ddff
SHA512e204b4da570b6f751fc6989c3725db9a12ea42c0278c16b063188534e8d42e88bff960562408bd3ecb14ae28bcb1c516cf8fd3ce94da6a61b61b44a5c93d989a
-
Filesize
320KB
MD550d9d27cb559210ef15a86c687492a84
SHA18dce0f57a7306bc3b60fb38800e24d9250c013ea
SHA2568d737898ca006438655f65f37c8fc2edf3cac42c80a871d0b5f32c2aba88ddff
SHA512e204b4da570b6f751fc6989c3725db9a12ea42c0278c16b063188534e8d42e88bff960562408bd3ecb14ae28bcb1c516cf8fd3ce94da6a61b61b44a5c93d989a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
712KB
MD5727624f8bc6059c71e01f297beaabe7f
SHA11f4230c1138c07d5cd9ac546944f25896fe8039f
SHA25646a26241ee7b55175f508e8cda0827edfd1e0604f22a693e5222e7f3c718b355
SHA512c3ef2bce2a2686821f5bb5e1d1525098f48770550265cd7cf4e45862dd6ce24190729ffae6c22bb3173eb4dab174a9b0360692f6d7ebbd3aa319d1d91d6b818d
-
Filesize
712KB
MD5727624f8bc6059c71e01f297beaabe7f
SHA11f4230c1138c07d5cd9ac546944f25896fe8039f
SHA25646a26241ee7b55175f508e8cda0827edfd1e0604f22a693e5222e7f3c718b355
SHA512c3ef2bce2a2686821f5bb5e1d1525098f48770550265cd7cf4e45862dd6ce24190729ffae6c22bb3173eb4dab174a9b0360692f6d7ebbd3aa319d1d91d6b818d
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
480KB
MD59859b525e857dc6a1799d182892bd8e0
SHA16ad6d7df461ec9fdeed4009ad7e1a1137b0477bd
SHA2565fd5fc4b5b5ce95adc9f4db3ee28bb326145a1707ec7160dac7647d313626a15
SHA51200f975bc9dd39fce0b87839f399d4c5036567cdb7e986e04deae49da2b5db99ff56af0c169d7c8c7f0274bbb031592f4fab5a484829fab2c3e25ae09ca46397a
-
Filesize
320KB
MD550d9d27cb559210ef15a86c687492a84
SHA18dce0f57a7306bc3b60fb38800e24d9250c013ea
SHA2568d737898ca006438655f65f37c8fc2edf3cac42c80a871d0b5f32c2aba88ddff
SHA512e204b4da570b6f751fc6989c3725db9a12ea42c0278c16b063188534e8d42e88bff960562408bd3ecb14ae28bcb1c516cf8fd3ce94da6a61b61b44a5c93d989a
-
Filesize
320KB
MD550d9d27cb559210ef15a86c687492a84
SHA18dce0f57a7306bc3b60fb38800e24d9250c013ea
SHA2568d737898ca006438655f65f37c8fc2edf3cac42c80a871d0b5f32c2aba88ddff
SHA512e204b4da570b6f751fc6989c3725db9a12ea42c0278c16b063188534e8d42e88bff960562408bd3ecb14ae28bcb1c516cf8fd3ce94da6a61b61b44a5c93d989a
-
Filesize
712KB
MD5727624f8bc6059c71e01f297beaabe7f
SHA11f4230c1138c07d5cd9ac546944f25896fe8039f
SHA25646a26241ee7b55175f508e8cda0827edfd1e0604f22a693e5222e7f3c718b355
SHA512c3ef2bce2a2686821f5bb5e1d1525098f48770550265cd7cf4e45862dd6ce24190729ffae6c22bb3173eb4dab174a9b0360692f6d7ebbd3aa319d1d91d6b818d
-
Filesize
712KB
MD5727624f8bc6059c71e01f297beaabe7f
SHA11f4230c1138c07d5cd9ac546944f25896fe8039f
SHA25646a26241ee7b55175f508e8cda0827edfd1e0604f22a693e5222e7f3c718b355
SHA512c3ef2bce2a2686821f5bb5e1d1525098f48770550265cd7cf4e45862dd6ce24190729ffae6c22bb3173eb4dab174a9b0360692f6d7ebbd3aa319d1d91d6b818d
-
Filesize
712KB
MD5727624f8bc6059c71e01f297beaabe7f
SHA11f4230c1138c07d5cd9ac546944f25896fe8039f
SHA25646a26241ee7b55175f508e8cda0827edfd1e0604f22a693e5222e7f3c718b355
SHA512c3ef2bce2a2686821f5bb5e1d1525098f48770550265cd7cf4e45862dd6ce24190729ffae6c22bb3173eb4dab174a9b0360692f6d7ebbd3aa319d1d91d6b818d
-
Filesize
712KB
MD5727624f8bc6059c71e01f297beaabe7f
SHA11f4230c1138c07d5cd9ac546944f25896fe8039f
SHA25646a26241ee7b55175f508e8cda0827edfd1e0604f22a693e5222e7f3c718b355
SHA512c3ef2bce2a2686821f5bb5e1d1525098f48770550265cd7cf4e45862dd6ce24190729ffae6c22bb3173eb4dab174a9b0360692f6d7ebbd3aa319d1d91d6b818d