Analysis
-
max time kernel
121s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2023 22:06
Behavioral task
behavioral1
Sample
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe
Resource
win7-20230220-en
General
-
Target
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe
-
Size
5.6MB
-
MD5
59a6cf429b04e27edf026dc9d6c401f5
-
SHA1
68aa9842635605fbc86c99ed66574ff5dbfa4cb5
-
SHA256
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759
-
SHA512
5396a444e48d49573312905d408210bef5821faad01ace19568465c1e8e5ea10e4ae91111e3ac8cbcf9621ad28673f35979718bba2fe833ef6260aaaf6fc2b63
-
SSDEEP
98304:AaPlXklTveze0Wl1AeDcn2BlJPD8Nzl2bT8mRaw8GFvuztrxcwmMQ:VR23tnt8NPLwJ+VfmM
Malware Config
Signatures
-
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Drops file in Drivers directory 2 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process File created C:\Windows\System32\drivers\etc\hosts 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Drops startup file 1 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Executes dropped EXE 5 IoCs
Processes:
bqyfemf.exe~szdesgk.exe~szdesgk.exelndondk.exe~szdesgk.exepid process 2844 bqyfemf.exe 1468 ~szdesgk.exe 4016 ~szdesgk.exe 1872 lndondk.exe 4720 ~szdesgk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2060-133-0x0000000000FC0000-0x0000000001B3A000-memory.dmp upx behavioral2/memory/5100-147-0x0000000000FC0000-0x0000000001B3A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\bqyfemf.exe upx C:\Users\Admin\AppData\Local\Temp\bqyfemf.exe upx behavioral2/memory/5100-159-0x0000000000FC0000-0x0000000001B3A000-memory.dmp upx behavioral2/memory/2844-160-0x0000000000B20000-0x000000000169A000-memory.dmp upx behavioral2/memory/2844-180-0x0000000000B20000-0x000000000169A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\lndondk.exe upx C:\Users\Admin\AppData\Local\Temp\lndondk.exe upx behavioral2/memory/2060-182-0x0000000000FC0000-0x0000000001B3A000-memory.dmp upx behavioral2/memory/1872-186-0x00000000007F0000-0x000000000136A000-memory.dmp upx behavioral2/memory/2060-194-0x0000000000FC0000-0x0000000001B3A000-memory.dmp upx behavioral2/memory/1872-209-0x00000000007F0000-0x000000000136A000-memory.dmp upx behavioral2/memory/2060-249-0x0000000000FC0000-0x0000000001B3A000-memory.dmp upx behavioral2/memory/2060-257-0x0000000000FC0000-0x0000000001B3A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 28 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exeRundll32.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCEEX 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnceEx 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" Rundll32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnceEx 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCEEX 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCEEX 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process File opened (read-only) \??\j: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\k: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\m: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\n: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\o: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\p: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\v: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\g: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\u: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\y: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\z: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\b: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\f: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\h: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\i: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\l: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\r: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\e: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\q: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\s: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\t: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\w: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\x: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe File opened (read-only) \??\a: 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2060-133-0x0000000000FC0000-0x0000000001B3A000-memory.dmp autoit_exe behavioral2/memory/5100-147-0x0000000000FC0000-0x0000000001B3A000-memory.dmp autoit_exe behavioral2/memory/5100-159-0x0000000000FC0000-0x0000000001B3A000-memory.dmp autoit_exe behavioral2/memory/2844-160-0x0000000000B20000-0x000000000169A000-memory.dmp autoit_exe behavioral2/memory/2844-180-0x0000000000B20000-0x000000000169A000-memory.dmp autoit_exe behavioral2/memory/2060-182-0x0000000000FC0000-0x0000000001B3A000-memory.dmp autoit_exe behavioral2/memory/1872-186-0x00000000007F0000-0x000000000136A000-memory.dmp autoit_exe behavioral2/memory/2060-194-0x0000000000FC0000-0x0000000001B3A000-memory.dmp autoit_exe behavioral2/memory/1872-209-0x00000000007F0000-0x000000000136A000-memory.dmp autoit_exe behavioral2/memory/2060-249-0x0000000000FC0000-0x0000000001B3A000-memory.dmp autoit_exe behavioral2/memory/2060-257-0x0000000000FC0000-0x0000000001B3A000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
runonce.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Processes:
~szdesgk.exe90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe~szdesgk.exe~szdesgk.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN ~szdesgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.136156.com/?30302" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\First Home Page = "http://www.136156.com/?30302" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.136156.com/?30302" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\First Home Page = "http://www.136156.com/?30302" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN ~szdesgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN ~szdesgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\MAIN 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\First Home Page = "http://www.136156.com/?30302" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.136156.com/?30302" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Modifies Internet Explorer start page 1 TTPs 3 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.136156.com/?30302" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.136156.com/?30302" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.136156.com/?30302" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Modifies registry class 25 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\NoAddOns 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\NoAddOns\Command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\" -extoff" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Open\Command 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82} 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\ = "Internet Explorer" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Open\ = "打开主页(&H)" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Set\Command 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\DefaultIcon 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\DefaultIcon\ = "C:\\Windows\\SysWOW64\\ieframe.dll,-190" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\NoAddOns\ = "在没有加载项的情况下启动" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Set\ = "属性(&R)" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Set\Command\ = "C:\\Windows\\SysWOW64\\rundll32.exe C:\\Windows\\SysWOW64\\shell32.dll,Control_RunDLL C:\\Windows\\SysWOW64\\inetcpl.cpl" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\NoAddOns\Command 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Open 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Open\Command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\"" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B5EAD1DB-7C18-4954-8820-01733BC08C82}\shell\Set 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exepid process 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 5100 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 5100 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 5100 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 5100 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 5100 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 5100 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exepid process 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
bqyfemf.exe~szdesgk.exe~szdesgk.exelndondk.exe~szdesgk.exedescription pid process Token: SeRestorePrivilege 2844 bqyfemf.exe Token: SeTakeOwnershipPrivilege 2844 bqyfemf.exe Token: SeDebugPrivilege 2844 bqyfemf.exe Token: SeSecurityPrivilege 2844 bqyfemf.exe Token: SeBackupPrivilege 1468 ~szdesgk.exe Token: SeRestorePrivilege 1468 ~szdesgk.exe Token: SeTakeOwnershipPrivilege 1468 ~szdesgk.exe Token: SeBackupPrivilege 4016 ~szdesgk.exe Token: SeRestorePrivilege 4016 ~szdesgk.exe Token: SeTakeOwnershipPrivilege 4016 ~szdesgk.exe Token: SeRestorePrivilege 1872 lndondk.exe Token: SeTakeOwnershipPrivilege 1872 lndondk.exe Token: SeDebugPrivilege 1872 lndondk.exe Token: SeSecurityPrivilege 1872 lndondk.exe Token: SeBackupPrivilege 4720 ~szdesgk.exe Token: SeRestorePrivilege 4720 ~szdesgk.exe Token: SeTakeOwnershipPrivilege 4720 ~szdesgk.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exepid process 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Suspicious use of SendNotifyMessage 38 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exepid process 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exeRundll32.exerunonce.execmd.execmd.exedescription pid process target process PID 2060 wrote to memory of 5100 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe PID 2060 wrote to memory of 5100 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe PID 2060 wrote to memory of 5100 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe PID 2060 wrote to memory of 2844 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe bqyfemf.exe PID 2060 wrote to memory of 2844 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe bqyfemf.exe PID 2060 wrote to memory of 2844 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe bqyfemf.exe PID 2060 wrote to memory of 1468 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe ~szdesgk.exe PID 2060 wrote to memory of 1468 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe ~szdesgk.exe PID 2060 wrote to memory of 4016 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe ~szdesgk.exe PID 2060 wrote to memory of 4016 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe ~szdesgk.exe PID 2060 wrote to memory of 1872 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe lndondk.exe PID 2060 wrote to memory of 1872 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe lndondk.exe PID 2060 wrote to memory of 1872 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe lndondk.exe PID 2060 wrote to memory of 4720 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe ~szdesgk.exe PID 2060 wrote to memory of 4720 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe ~szdesgk.exe PID 2060 wrote to memory of 2720 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Rundll32.exe PID 2060 wrote to memory of 2720 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Rundll32.exe PID 2720 wrote to memory of 4900 2720 Rundll32.exe runonce.exe PID 2720 wrote to memory of 4900 2720 Rundll32.exe runonce.exe PID 4900 wrote to memory of 1924 4900 runonce.exe grpconv.exe PID 4900 wrote to memory of 1924 4900 runonce.exe grpconv.exe PID 2060 wrote to memory of 1176 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe cmd.exe PID 2060 wrote to memory of 1176 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe cmd.exe PID 2060 wrote to memory of 1804 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe cmd.exe PID 2060 wrote to memory of 1804 2060 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe cmd.exe PID 1804 wrote to memory of 5108 1804 cmd.exe PING.EXE PID 1804 wrote to memory of 5108 1804 cmd.exe PING.EXE PID 1176 wrote to memory of 3036 1176 cmd.exe PING.EXE PID 1176 wrote to memory of 3036 1176 cmd.exe PING.EXE -
System policy modification 1 TTPs 3 IoCs
Processes:
90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe"C:\Users\Admin\AppData\Local\Temp\90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe"1⤵
- UAC bypass
- Drops file in Drivers directory
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exeC:\Users\Admin\AppData\Local\Temp\90a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759.exe /nstart2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\bqyfemf.exeC:\Users\Admin\AppData\Local\Temp\bqyfemf.exe /HomeRegAccess102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\~szdesgk.exeC:\Users\Admin\AppData\Local\Temp\~szdesgk.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN" -ot reg -actn setowner -ownr "n:Administrators"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\~szdesgk.exeC:\Users\Admin\AppData\Local\Temp\~szdesgk.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN" -ot reg -actn ace -ace "n:Everyone;p:full;i:np;m:set" -rec no2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\lndondk.exeC:\Users\Admin\AppData\Local\Temp\lndondk.exe /HomeRegAccess102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\~szdesgk.exeC:\Users\Admin\AppData\Local\Temp\~szdesgk.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN" -ot reg -actn ace -ace "n:Everyone;p:full;i:np;m:set" -rec no2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\Rundll32.exeRundll32.exe setupapi,InstallHinfSection DefaultInstall 132 C:\Users\Admin\AppData\Local\Temp\~dlooezx.inf2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\huME2LL.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\vVLELAI.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5100ikfvxcwFilesize
392KB
MD5db7a38e7da6b7ac5c06fe9f1fe6db1d1
SHA1e652b9938988192919eb5f98aed33c47b787559e
SHA2569b6f03211f080e379ff476c55b447f5ddb4c6ba0efba91963405c95852009b5f
SHA5120fea6dd05048ab83ad018b4d41f221d3d60131422751d41678a11e889a0b005b2d5ac4f9b088958c7594f9574dd96652c9307d05e2a9fb4a1961ea10d770ca0a
-
C:\Users\Admin\AppData\Local\Temp\aut8235.tmpFilesize
76KB
MD592401b81f77ff322e2c4b6b587fe8d28
SHA1fdc2840a018653f69426d4d31ace2b19c29e8364
SHA25653a1d227591f430b09dcbf953120c8892a2f41e95d4d726c23e36dd07cb979eb
SHA51220ecd667e2e04ee16ccd20bab41fd5f2ea1097c6022c4cafff6560956d7aefdc8576fd119061cf2c2eab6c8bba272bfc09c520075c1062eaeb44ac3801c4dcca
-
C:\Users\Admin\AppData\Local\Temp\bqyfemf.exeFilesize
5.6MB
MD559a6cf429b04e27edf026dc9d6c401f5
SHA168aa9842635605fbc86c99ed66574ff5dbfa4cb5
SHA25690a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759
SHA5125396a444e48d49573312905d408210bef5821faad01ace19568465c1e8e5ea10e4ae91111e3ac8cbcf9621ad28673f35979718bba2fe833ef6260aaaf6fc2b63
-
C:\Users\Admin\AppData\Local\Temp\bqyfemf.exeFilesize
5.6MB
MD559a6cf429b04e27edf026dc9d6c401f5
SHA168aa9842635605fbc86c99ed66574ff5dbfa4cb5
SHA25690a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759
SHA5125396a444e48d49573312905d408210bef5821faad01ace19568465c1e8e5ea10e4ae91111e3ac8cbcf9621ad28673f35979718bba2fe833ef6260aaaf6fc2b63
-
C:\Users\Admin\AppData\Local\Temp\huME2LL.batFilesize
689B
MD5b31ebc599c157330298f521f2627836d
SHA1b10a69e90c548b6ec4c60fd53ee833aa46076f81
SHA2569759d4f9867ad6eef8960579f800d4713c1a9d6a0f9db5af9934b021ff5075be
SHA5129eb93bf7563fc4c61f4c60c316ac8c9a065f16e5f592d28e6973f0a1e41f1bd1cd0050ad20bf0864da0931d02e4bc43e699584ca278e1e7316519f158af5b66d
-
C:\Users\Admin\AppData\Local\Temp\lndondk.exeFilesize
5.6MB
MD559a6cf429b04e27edf026dc9d6c401f5
SHA168aa9842635605fbc86c99ed66574ff5dbfa4cb5
SHA25690a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759
SHA5125396a444e48d49573312905d408210bef5821faad01ace19568465c1e8e5ea10e4ae91111e3ac8cbcf9621ad28673f35979718bba2fe833ef6260aaaf6fc2b63
-
C:\Users\Admin\AppData\Local\Temp\lndondk.exeFilesize
5.6MB
MD559a6cf429b04e27edf026dc9d6c401f5
SHA168aa9842635605fbc86c99ed66574ff5dbfa4cb5
SHA25690a24a5db1c52046ff692ab44943d860987eb2508dca6d112e4af59f6c99f759
SHA5125396a444e48d49573312905d408210bef5821faad01ace19568465c1e8e5ea10e4ae91111e3ac8cbcf9621ad28673f35979718bba2fe833ef6260aaaf6fc2b63
-
C:\Users\Admin\AppData\Local\Temp\vVLELAI.batFilesize
465B
MD594027a1080a24669846f7ca39290addf
SHA1c08d46bcbc6dd5b7769535eb6faba2e914a0476f
SHA256aae9a4524105c8e567f50fc2ab2114cde4e540aa3e0c53ce6fe09040ffe64e04
SHA512c87d48db2b8009bce03c8accb236aa74297b395a9e524451bae347cf4b2c69d3ae6ca4732d5f296662e4c7e3ed39510d7fe54caaff470a1cd4e88fdb2ca17e60
-
C:\Users\Admin\AppData\Local\Temp\~dlooezx.infFilesize
32B
MD58f5f4837dd4a1680d79bbdca9cc1e08f
SHA1688b5d5ef993733b97b303ed4c8409a14b230de5
SHA2562bce6b9395cc74d16b9c94fd90debd9d524ffb53c6f6ae3a49b6e139671417b2
SHA512bd75b564fe3c93dffdc65fe58463378f54268308ca5eaba5fc7f80458016f331a6596bfdaf63845c1d5c6c60df2a0ec2aff94d2aae7797da4f5f975f0363bd66
-
C:\Users\Admin\AppData\Local\Temp\~szdesgk.exeFilesize
546KB
MD53e350eb5df15c06dec400a39dd1c6f29
SHA1f1434cfef2c05fda919922b721ec1a17adb3194e
SHA256427ff43693cb3ca2812c4754f607f107a6b2d3f5a8b313addee57d89982df419
SHA512b6b6cdfe2b08aa49254e48302385a3a2a8385e2228bdcffd3032757acf1a1d4abff1270f5488083cfa4480439ff161a9d0ea5f193cabc1eb1e7b1255ce262ab6
-
C:\Users\Admin\AppData\Local\Temp\~szdesgk.exeFilesize
546KB
MD53e350eb5df15c06dec400a39dd1c6f29
SHA1f1434cfef2c05fda919922b721ec1a17adb3194e
SHA256427ff43693cb3ca2812c4754f607f107a6b2d3f5a8b313addee57d89982df419
SHA512b6b6cdfe2b08aa49254e48302385a3a2a8385e2228bdcffd3032757acf1a1d4abff1270f5488083cfa4480439ff161a9d0ea5f193cabc1eb1e7b1255ce262ab6
-
C:\Users\Admin\AppData\Local\Temp\~szdesgk.exeFilesize
546KB
MD53e350eb5df15c06dec400a39dd1c6f29
SHA1f1434cfef2c05fda919922b721ec1a17adb3194e
SHA256427ff43693cb3ca2812c4754f607f107a6b2d3f5a8b313addee57d89982df419
SHA512b6b6cdfe2b08aa49254e48302385a3a2a8385e2228bdcffd3032757acf1a1d4abff1270f5488083cfa4480439ff161a9d0ea5f193cabc1eb1e7b1255ce262ab6
-
C:\Users\Admin\AppData\Local\Temp\~szdesgk.exeFilesize
546KB
MD53e350eb5df15c06dec400a39dd1c6f29
SHA1f1434cfef2c05fda919922b721ec1a17adb3194e
SHA256427ff43693cb3ca2812c4754f607f107a6b2d3f5a8b313addee57d89982df419
SHA512b6b6cdfe2b08aa49254e48302385a3a2a8385e2228bdcffd3032757acf1a1d4abff1270f5488083cfa4480439ff161a9d0ea5f193cabc1eb1e7b1255ce262ab6
-
memory/1872-209-0x00000000007F0000-0x000000000136A000-memory.dmpFilesize
11.5MB
-
memory/1872-186-0x00000000007F0000-0x000000000136A000-memory.dmpFilesize
11.5MB
-
memory/2060-182-0x0000000000FC0000-0x0000000001B3A000-memory.dmpFilesize
11.5MB
-
memory/2060-194-0x0000000000FC0000-0x0000000001B3A000-memory.dmpFilesize
11.5MB
-
memory/2060-133-0x0000000000FC0000-0x0000000001B3A000-memory.dmpFilesize
11.5MB
-
memory/2060-249-0x0000000000FC0000-0x0000000001B3A000-memory.dmpFilesize
11.5MB
-
memory/2060-257-0x0000000000FC0000-0x0000000001B3A000-memory.dmpFilesize
11.5MB
-
memory/2844-180-0x0000000000B20000-0x000000000169A000-memory.dmpFilesize
11.5MB
-
memory/2844-160-0x0000000000B20000-0x000000000169A000-memory.dmpFilesize
11.5MB
-
memory/5100-159-0x0000000000FC0000-0x0000000001B3A000-memory.dmpFilesize
11.5MB
-
memory/5100-147-0x0000000000FC0000-0x0000000001B3A000-memory.dmpFilesize
11.5MB