Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe
Resource
win10v2004-20231023-en
General
-
Target
214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe
-
Size
1.3MB
-
MD5
bf08b2b016613d90c4ac0295c6b75fdf
-
SHA1
841a8902ec5b7c41758d4e1d78d9527a67fe471d
-
SHA256
214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d
-
SHA512
845e00ee2737a2811b877a801a9e5a74daf5fef29efc54f9bed11bc416f93a9fb1cc066def7ce952128a866377358dba5193d399b66cf672b8108fcd719b8442
-
SSDEEP
6144:p3ue8ySm8hQAAIfFrRXuEE+0l97mKwKRqHVqlWo86JQPDHDdx/Qtqa:z/zkFF+EExZmKbRuVqlWoPJQPDHvd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xjqvein.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xjqvein.exe -
Adds policy Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "kjdvriatqhhnaqyobzgf.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "mjbrlaqhcrptesymxt.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "dzqfymbrlzwzjwboy.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zzunkcvpnfgnbsbsgfnni.exe" xjqvein.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "zzunkcvpnfgnbsbsgfnni.exe" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kjdvriatqhhnaqyobzgf.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kjdvriatqhhnaqyobzgf.exe" xjqvein.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjbrlaqhcrptesymxt.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xvofaqhzvlkpbqxmyvb.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe" xjqvein.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "dzqfymbrlzwzjwboy.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "xvofaqhzvlkpbqxmyvb.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zzunkcvpnfgnbsbsgfnni.exe" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "zzunkcvpnfgnbsbsgfnni.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "xvofaqhzvlkpbqxmyvb.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "wrhvnaodwjfhqcgs.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dzqfymbrlzwzjwboy.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "wrhvnaodwjfhqcgs.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "wrhvnaodwjfhqcgs.exe" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "zzunkcvpnfgnbsbsgfnni.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wlvdpwenah = "mjbrlaqhcrptesymxt.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjbrlaqhcrptesymxt.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xjqvein = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xvofaqhzvlkpbqxmyvb.exe" xjqvein.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xjqvein.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xjqvein.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe -
Executes dropped EXE 2 IoCs
pid Process 2652 xjqvein.exe 2656 xjqvein.exe -
Loads dropped DLL 4 IoCs
pid Process 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "mjbrlaqhcrptesymxt.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "mjbrlaqhcrptesymxt.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "dzqfymbrlzwzjwboy.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "dzqfymbrlzwzjwboy.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nfsdscnzpzsrx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zzunkcvpnfgnbsbsgfnni.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nfsdscnzpzsrx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dzqfymbrlzwzjwboy.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dzqfymbrlzwzjwboy.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dzqfymbrlzwzjwboy.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xvofaqhzvlkpbqxmyvb.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kjdvriatqhhnaqyobzgf.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjbrlaqhcrptesymxt.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zzunkcvpnfgnbsbsgfnni.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nfsdscnzpzsrx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjbrlaqhcrptesymxt.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "zzunkcvpnfgnbsbsgfnni.exe ." 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "xvofaqhzvlkpbqxmyvb.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zzunkcvpnfgnbsbsgfnni.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\rhsbowfpdlc = "wrhvnaodwjfhqcgs.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\rhsbowfpdlc = "dzqfymbrlzwzjwboy.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "kjdvriatqhhnaqyobzgf.exe ." 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe ." 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "zzunkcvpnfgnbsbsgfnni.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\rhsbowfpdlc = "mjbrlaqhcrptesymxt.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "wrhvnaodwjfhqcgs.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nfsdscnzpzsrx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xvofaqhzvlkpbqxmyvb.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kjdvriatqhhnaqyobzgf.exe" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zzunkcvpnfgnbsbsgfnni.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "kjdvriatqhhnaqyobzgf.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "zzunkcvpnfgnbsbsgfnni.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\rhsbowfpdlc = "zzunkcvpnfgnbsbsgfnni.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nfsdscnzpzsrx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjbrlaqhcrptesymxt.exe ." 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kjdvriatqhhnaqyobzgf.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nfsdscnzpzsrx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "wrhvnaodwjfhqcgs.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dzqfymbrlzwzjwboy.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "kjdvriatqhhnaqyobzgf.exe ." 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\rhsbowfpdlc = "kjdvriatqhhnaqyobzgf.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "kjdvriatqhhnaqyobzgf.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "kjdvriatqhhnaqyobzgf.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "xvofaqhzvlkpbqxmyvb.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjbrlaqhcrptesymxt.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "mjbrlaqhcrptesymxt.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zzunkcvpnfgnbsbsgfnni.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kjdvriatqhhnaqyobzgf.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xvofaqhzvlkpbqxmyvb.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "xvofaqhzvlkpbqxmyvb.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "zzunkcvpnfgnbsbsgfnni.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xvofaqhzvlkpbqxmyvb.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjbrlaqhcrptesymxt.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "mjbrlaqhcrptesymxt.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ohvhxiuhyjddku = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrhvnaodwjfhqcgs.exe" xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "kjdvriatqhhnaqyobzgf.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "zzunkcvpnfgnbsbsgfnni.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\mzhnxcip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dzqfymbrlzwzjwboy.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\rhsbowfpdlc = "wrhvnaodwjfhqcgs.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xvofaqhzvlkpbqxmyvb.exe ." xjqvein.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "wrhvnaodwjfhqcgs.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\rhsbowfpdlc = "dzqfymbrlzwzjwboy.exe" xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ofrbpyitirjh = "wrhvnaodwjfhqcgs.exe ." xjqvein.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\drahsyfnz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kjdvriatqhhnaqyobzgf.exe ." xjqvein.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xjqvein.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xjqvein.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 whatismyipaddress.com 12 www.showmyipaddress.com 18 whatismyip.everdot.org -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\affdfcazczfrkguqjnaffd.caz xjqvein.exe File created C:\Windows\SysWOW64\affdfcazczfrkguqjnaffd.caz xjqvein.exe File opened for modification C:\Windows\SysWOW64\rhsbowfpdlczdkjqujhxiremvftbsptaz.kzx xjqvein.exe File created C:\Windows\SysWOW64\rhsbowfpdlczdkjqujhxiremvftbsptaz.kzx xjqvein.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\rhsbowfpdlczdkjqujhxiremvftbsptaz.kzx xjqvein.exe File opened for modification C:\Program Files (x86)\affdfcazczfrkguqjnaffd.caz xjqvein.exe File created C:\Program Files (x86)\affdfcazczfrkguqjnaffd.caz xjqvein.exe File opened for modification C:\Program Files (x86)\rhsbowfpdlczdkjqujhxiremvftbsptaz.kzx xjqvein.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rhsbowfpdlczdkjqujhxiremvftbsptaz.kzx xjqvein.exe File created C:\Windows\rhsbowfpdlczdkjqujhxiremvftbsptaz.kzx xjqvein.exe File opened for modification C:\Windows\affdfcazczfrkguqjnaffd.caz xjqvein.exe File created C:\Windows\affdfcazczfrkguqjnaffd.caz xjqvein.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe 2656 xjqvein.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 xjqvein.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2652 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 29 PID 1720 wrote to memory of 2652 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 29 PID 1720 wrote to memory of 2652 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 29 PID 1720 wrote to memory of 2652 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 29 PID 1720 wrote to memory of 2656 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 30 PID 1720 wrote to memory of 2656 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 30 PID 1720 wrote to memory of 2656 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 30 PID 1720 wrote to memory of 2656 1720 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe 30 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xjqvein.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xjqvein.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xjqvein.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xjqvein.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xjqvein.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" 214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xjqvein.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xjqvein.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe"C:\Users\Admin\AppData\Local\Temp\214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\xjqvein.exe"C:\Users\Admin\AppData\Local\Temp\xjqvein.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System policy modification
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\xjqvein.exe"C:\Users\Admin\AppData\Local\Temp\xjqvein.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD55192ae431ba87dadd295fb54be12d07a
SHA1977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715
SHA25635ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f
SHA51281e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d
-
Filesize
2.1MB
MD55192ae431ba87dadd295fb54be12d07a
SHA1977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715
SHA25635ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f
SHA51281e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d
-
Filesize
2.1MB
MD55192ae431ba87dadd295fb54be12d07a
SHA1977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715
SHA25635ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f
SHA51281e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d
-
Filesize
272B
MD58d33928481e3a6dc00a6fbd77ba86d00
SHA106f9c99baca2b28143e2afafb2485c126e438a3e
SHA2561cc907f0f374998a58162be8ef9cad601db8870ce3b18f6fca0452087481f3e1
SHA512e1fb9bf728b4635911746aec74ea5cff2e4fd6fb05260cf03687d9e938b9dc2cc54d12bfbb38bd12d27ac61ca36223f850ab8d7006e5f0b139ce31e6276ee008
-
Filesize
3KB
MD5e2583579c97e4cf4c66025a24ff2eb94
SHA13bd2e76108a527a6f91090ba9e4cd48b3d8a045a
SHA25611b0763756b0add09ec1e3511dee344a8bce8334c34ca2aa64a8f1e87ef97756
SHA512979820185d7af1ce7624e337bfe107f8d34c99ac2e28accd1c669e22f02c20f6a89260a0b022fbbb9e8c0c75c928210c14084ec088aa707fcb7a5b44fb2cf36a
-
Filesize
2.1MB
MD55192ae431ba87dadd295fb54be12d07a
SHA1977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715
SHA25635ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f
SHA51281e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d
-
Filesize
2.1MB
MD55192ae431ba87dadd295fb54be12d07a
SHA1977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715
SHA25635ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f
SHA51281e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d
-
Filesize
2.1MB
MD55192ae431ba87dadd295fb54be12d07a
SHA1977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715
SHA25635ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f
SHA51281e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d
-
Filesize
2.1MB
MD55192ae431ba87dadd295fb54be12d07a
SHA1977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715
SHA25635ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f
SHA51281e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d