Analysis
-
max time kernel
154s -
max time network
212s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe
Resource
win10v2004-20220812-en
General
-
Target
6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe
-
Size
689KB
-
MD5
2f0de876be5390e42575fed9ecb026d0
-
SHA1
af1db80d3bb7d6af3e7a632b1d23f52b7e32239c
-
SHA256
6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0
-
SHA512
f80b07931a70bc81002e663910c139979c6ab9083eb4f13fb9956fbd4630e16a4ec7adbbef97adad3434fd2fcd71fb8f0f11d7ae0c6fb8d94411722d39d2b3bc
-
SSDEEP
1536:W8QCGQWlngkYFKynXvAh1MFOMLwOueYdqXhVBZXcMik421dNSkWNVYM3O3:WhvQQgk6Kyn/wMFOMLN9AQdjWzT+
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List CD0075.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\EE0B7267D68E0537\CD0075.exe = "C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe:*:Enabled:@xpsp2res.dll,-57951861" CD0075.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" CD0075.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" CD0075.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\EE0B7267D68E0537\CD0075.exe = "C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe:*:Enabled:@xpsp2res.dll,-70554750" CD0075.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" CD0075.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\EE0B7267D68E0537\CD0075.exe = "C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe:*:Enabled:@xpsp2res.dll,-53342401" CD0075.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List CD0075.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\EE0B7267D68E0537\CD0075.exe = "C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe:*:Enabled:@xpsp2res.dll,-28956246" CD0075.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" CD0075.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List CD0075.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile CD0075.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications CD0075.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" CD0075.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" CD0075.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" CD0075.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CD0075.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" CD0075.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" CD0075.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CD0075.exe -
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 580 CD0075.exe 1992 CD0075.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgemc.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkpop.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avsched32.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd32.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfagent.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navnt.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nmain.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\supftrl.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpmon.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lucomserver.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssmmc32.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntrtscan.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscan.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\st2.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpc32.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HelpPane.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\clean.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\esafe.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvc95.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\padmin.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rescue32.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rtvscn95.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scvhosl.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpdos32.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avptc32.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symproxysvc.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsched.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlite40eng.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\killprocesssetup161.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navapw32.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvlaunch.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sh.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webtrap.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlh.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alerter.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autotrace.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nav32_loader.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pingscan.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsscan40.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwebloader.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav32.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfw2en.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navengnavex15.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpostinstall.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\virusmdpersonalfirewall.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpf9x206.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsmb32.exe CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpro.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mdll.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwinst4.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perswf.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UCCLSID.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpinst.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds2-98.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswin9xe.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\evpn.exe CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outpost.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pccmain.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\persfw.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rshell.exe\Debugger = "\"C:\\Users\\Admin\\EE0B7267D68E0537\\CD0075.exe\"" CD0075.exe -
resource yara_rule behavioral1/memory/2024-54-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2024-57-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2024-58-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2024-61-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2024-68-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/1992-80-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/1992-82-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Anytime Upgrade.exe CD0075.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\cval = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" CD0075.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CD0075.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2044 set thread context of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 580 set thread context of 1992 580 CD0075.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Sound CD0075.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Sound\Beep = "no" CD0075.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Download CD0075.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main CD0075.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://ut413t80e34a3p1.directorio-w.com" CD0075.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" CD0075.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" CD0075.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://gkjpbom837gyb62.directorio-w.com" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://n4v4ts7rpqs39n2.directorio-w.com" CD0075.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page = "http://324k31644sku5hn.directorio-w.com" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://bowzmu2058ur0v1.directorio-w.com" CD0075.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://x5r17a1qnmmd350.directorio-w.com" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://v20upq3v89spp59.directorio-w.com" CD0075.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" CD0075.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main CD0075.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Local Page = "http://6720ljrsy73fg93.directorio-w.com" CD0075.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://8x9gv3617i2ol66.directorio-w.com" CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://6n562wh0v2cr8b4.directorio-w.com" CD0075.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command CD0075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application CD0075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell CD0075.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1992 CD0075.exe 1992 CD0075.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 1992 CD0075.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 1992 CD0075.exe 1992 CD0075.exe 1992 CD0075.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 2044 wrote to memory of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 2044 wrote to memory of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 2044 wrote to memory of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 2044 wrote to memory of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 2044 wrote to memory of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 2044 wrote to memory of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 2044 wrote to memory of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 2044 wrote to memory of 2024 2044 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 28 PID 2024 wrote to memory of 1136 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 29 PID 2024 wrote to memory of 1136 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 29 PID 2024 wrote to memory of 1136 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 29 PID 2024 wrote to memory of 1136 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 29 PID 2024 wrote to memory of 580 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 30 PID 2024 wrote to memory of 580 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 30 PID 2024 wrote to memory of 580 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 30 PID 2024 wrote to memory of 580 2024 6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe 30 PID 580 wrote to memory of 1992 580 CD0075.exe 31 PID 580 wrote to memory of 1992 580 CD0075.exe 31 PID 580 wrote to memory of 1992 580 CD0075.exe 31 PID 580 wrote to memory of 1992 580 CD0075.exe 31 PID 580 wrote to memory of 1992 580 CD0075.exe 31 PID 580 wrote to memory of 1992 580 CD0075.exe 31 PID 580 wrote to memory of 1992 580 CD0075.exe 31 PID 580 wrote to memory of 1992 580 CD0075.exe 31 PID 580 wrote to memory of 1992 580 CD0075.exe 31 PID 1992 wrote to memory of 748 1992 CD0075.exe 32 PID 1992 wrote to memory of 748 1992 CD0075.exe 32 PID 1992 wrote to memory of 748 1992 CD0075.exe 32 PID 1992 wrote to memory of 748 1992 CD0075.exe 32 PID 1992 wrote to memory of 1300 1992 CD0075.exe 10 PID 1992 wrote to memory of 1300 1992 CD0075.exe 10 PID 1992 wrote to memory of 1300 1992 CD0075.exe 10 PID 1992 wrote to memory of 1300 1992 CD0075.exe 10 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" CD0075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" CD0075.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe"C:\Users\Admin\AppData\Local\Temp\6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe"C:\Users\Admin\AppData\Local\Temp\6ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:1136
-
-
C:\Users\Admin\EE0B7267D68E0537\CD0075.exe"C:\Users\Admin\EE0B7267D68E0537\CD0075.exe" 10BB52B54⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\EE0B7267D68E0537\CD0075.exe10BB52B55⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Windows security modification
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1992 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:748
-
-
-
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1616
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
689KB
MD52f0de876be5390e42575fed9ecb026d0
SHA1af1db80d3bb7d6af3e7a632b1d23f52b7e32239c
SHA2566ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0
SHA512f80b07931a70bc81002e663910c139979c6ab9083eb4f13fb9956fbd4630e16a4ec7adbbef97adad3434fd2fcd71fb8f0f11d7ae0c6fb8d94411722d39d2b3bc
-
Filesize
689KB
MD52f0de876be5390e42575fed9ecb026d0
SHA1af1db80d3bb7d6af3e7a632b1d23f52b7e32239c
SHA2566ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0
SHA512f80b07931a70bc81002e663910c139979c6ab9083eb4f13fb9956fbd4630e16a4ec7adbbef97adad3434fd2fcd71fb8f0f11d7ae0c6fb8d94411722d39d2b3bc
-
Filesize
689KB
MD52f0de876be5390e42575fed9ecb026d0
SHA1af1db80d3bb7d6af3e7a632b1d23f52b7e32239c
SHA2566ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0
SHA512f80b07931a70bc81002e663910c139979c6ab9083eb4f13fb9956fbd4630e16a4ec7adbbef97adad3434fd2fcd71fb8f0f11d7ae0c6fb8d94411722d39d2b3bc
-
Filesize
689KB
MD52f0de876be5390e42575fed9ecb026d0
SHA1af1db80d3bb7d6af3e7a632b1d23f52b7e32239c
SHA2566ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0
SHA512f80b07931a70bc81002e663910c139979c6ab9083eb4f13fb9956fbd4630e16a4ec7adbbef97adad3434fd2fcd71fb8f0f11d7ae0c6fb8d94411722d39d2b3bc
-
Filesize
689KB
MD52f0de876be5390e42575fed9ecb026d0
SHA1af1db80d3bb7d6af3e7a632b1d23f52b7e32239c
SHA2566ed40fc11cd4e3dee79b5228b366c1797e962010631d7fd1f88982d6f71c90d0
SHA512f80b07931a70bc81002e663910c139979c6ab9083eb4f13fb9956fbd4630e16a4ec7adbbef97adad3434fd2fcd71fb8f0f11d7ae0c6fb8d94411722d39d2b3bc