Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
969b2dabe6080bc2da7236a0d455ced7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
969b2dabe6080bc2da7236a0d455ced7.exe
Resource
win10v2004-20231215-en
General
-
Target
969b2dabe6080bc2da7236a0d455ced7.exe
-
Size
480KB
-
MD5
969b2dabe6080bc2da7236a0d455ced7
-
SHA1
f2b4c9c70bbb5e11ec823846ad88a20c235775cd
-
SHA256
4e7ae8c1b57d2178d7014c18b11a0d9ff1444f07d513ea8fdfa5af7a11f02873
-
SHA512
1218dab072f3144304196c98f1b3c0494448929b8e6be35d5db88ef3dee0d0c12191f8cf3c94d8287195cde1af9a2a910a230d2e96f987e196e34ba00ae247c0
-
SSDEEP
6144:Kjg5pk1GS0xX3lPtbNN/DNRgkpiZzjhDQ0oeGF91YVusYJx+9sisyYpFTOOzHTvP:Kg5pBHxXptbN5ZRgOiBjw/C0AWzFjPvP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" flvoztxypvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" flvoztxypvf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aghst.exe -
Adds policy Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "ngusgzvjwsylccuvgo.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewjgtlgtfafrhgxxh.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awnofbarhgpfzcxbpaokb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "ewjgtlgtfafrhgxxh.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "awnofbarhgpfzcxbpaokb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "xoawiztfqkozomcb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awnofbarhgpfzcxbpaokb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "awnofbarhgpfzcxbpaokb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run flvoztxypvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "lgwwmhfvkiqfyauxkuhc.exe" flvoztxypvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aghst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run flvoztxypvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xoawiztfqkozomcb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "ewjgtlgtfafrhgxxh.exe" flvoztxypvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "ewjgtlgtfafrhgxxh.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngusgzvjwsylccuvgo.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "yshgvpmbpmthzatvhqc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngusgzvjwsylccuvgo.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngusgzvjwsylccuvgo.exe" flvoztxypvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rwwg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awnofbarhgpfzcxbpaokb.exe" flvoztxypvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ygjwzhs = "ngusgzvjwsylccuvgo.exe" aghst.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aghst.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aghst.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" flvoztxypvf.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 969b2dabe6080bc2da7236a0d455ced7.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation flvoztxypvf.exe -
Executes dropped EXE 4 IoCs
pid Process 4740 flvoztxypvf.exe 4676 aghst.exe 1788 aghst.exe 456 flvoztxypvf.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "ngusgzvjwsylccuvgo.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xoawiztfqkozomcb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aghst = "ewjgtlgtfafrhgxxh.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xioekvjpui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewjgtlgtfafrhgxxh.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "ewjgtlgtfafrhgxxh.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwaosbnr = "ngusgzvjwsylccuvgo.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aghst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xoawiztfqkozomcb.exe" flvoztxypvf.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eotinxkpt = "yshgvpmbpmthzatvhqc.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aghst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awnofbarhgpfzcxbpaokb.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aghst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewjgtlgtfafrhgxxh.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "ngusgzvjwsylccuvgo.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xioekvjpui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awnofbarhgpfzcxbpaokb.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aghst = "ngusgzvjwsylccuvgo.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngusgzvjwsylccuvgo.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xoawiztfqkozomcb.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwaosbnr = "xoawiztfqkozomcb.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwaosbnr = "ngusgzvjwsylccuvgo.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aghst = "awnofbarhgpfzcxbpaokb.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aghst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewjgtlgtfafrhgxxh.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xioekvjpui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xoawiztfqkozomcb.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eotinxkpt = "yshgvpmbpmthzatvhqc.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "yshgvpmbpmthzatvhqc.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eotinxkpt = "awnofbarhgpfzcxbpaokb.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aghst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "lgwwmhfvkiqfyauxkuhc.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aghst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewjgtlgtfafrhgxxh.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eotinxkpt = "xoawiztfqkozomcb.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "xoawiztfqkozomcb.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "awnofbarhgpfzcxbpaokb.exe ." flvoztxypvf.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwaosbnr = "ngusgzvjwsylccuvgo.exe" flvoztxypvf.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aghst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewjgtlgtfafrhgxxh.exe" flvoztxypvf.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwaosbnr = "lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xioekvjpui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngusgzvjwsylccuvgo.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "lgwwmhfvkiqfyauxkuhc.exe ." flvoztxypvf.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwaosbnr = "lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "ewjgtlgtfafrhgxxh.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eotinxkpt = "xoawiztfqkozomcb.exe ." flvoztxypvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aghst = "xoawiztfqkozomcb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awnofbarhgpfzcxbpaokb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xioekvjpui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eotinxkpt = "awnofbarhgpfzcxbpaokb.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xioekvjpui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xoawiztfqkozomcb.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgwwmhfvkiqfyauxkuhc.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "awnofbarhgpfzcxbpaokb.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aghst = "ngusgzvjwsylccuvgo.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awnofbarhgpfzcxbpaokb.exe ." flvoztxypvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngusgzvjwsylccuvgo.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe ." flvoztxypvf.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eotinxkpt = "ewjgtlgtfafrhgxxh.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xoawiztfqkozomcb.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nwaosbnr = "awnofbarhgpfzcxbpaokb.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xoawiztfqkozomcb.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eotinxkpt = "lgwwmhfvkiqfyauxkuhc.exe ." aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aghst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xoawiztfqkozomcb.exe" aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgwwmhfvkiqfyauxkuhc.exe" aghst.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lsugip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\selcjvkrxml = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngusgzvjwsylccuvgo.exe" flvoztxypvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xioekvjpui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe ." aghst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\xioekvjpui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yshgvpmbpmthzatvhqc.exe ." flvoztxypvf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aghst.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" flvoztxypvf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" flvoztxypvf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aghst.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aghst.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 www.showmyipaddress.com 27 whatismyipaddress.com 38 whatismyip.everdot.org 46 whatismyip.everdot.org 20 whatismyip.everdot.org -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf aghst.exe File created C:\autorun.inf aghst.exe File opened for modification F:\autorun.inf aghst.exe File created F:\autorun.inf aghst.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xoawiztfqkozomcb.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\rogiaxxpggqhcgchwixumo.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\lgwwmhfvkiqfyauxkuhc.exe aghst.exe File opened for modification C:\Windows\SysWOW64\lgwwmhfvkiqfyauxkuhc.exe aghst.exe File opened for modification C:\Windows\SysWOW64\awnofbarhgpfzcxbpaokb.exe aghst.exe File opened for modification C:\Windows\SysWOW64\lgwwmhfvkiqfyauxkuhc.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\ngusgzvjwsylccuvgo.exe aghst.exe File opened for modification C:\Windows\SysWOW64\yshgvpmbpmthzatvhqc.exe aghst.exe File opened for modification C:\Windows\SysWOW64\bcyeabfbwaojiqqzsibcye.bfb aghst.exe File opened for modification C:\Windows\SysWOW64\awnofbarhgpfzcxbpaokb.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\rogiaxxpggqhcgchwixumo.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\awnofbarhgpfzcxbpaokb.exe aghst.exe File opened for modification C:\Windows\SysWOW64\ewjgtlgtfafrhgxxh.exe aghst.exe File opened for modification C:\Windows\SysWOW64\yshgvpmbpmthzatvhqc.exe aghst.exe File opened for modification C:\Windows\SysWOW64\xoawiztfqkozomcb.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\ewjgtlgtfafrhgxxh.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\ewjgtlgtfafrhgxxh.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\yshgvpmbpmthzatvhqc.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\xoawiztfqkozomcb.exe aghst.exe File opened for modification C:\Windows\SysWOW64\rogiaxxpggqhcgchwixumo.exe aghst.exe File opened for modification C:\Windows\SysWOW64\selcjvkrxmlrbufzdeiubszlahncbhrkv.tuy aghst.exe File created C:\Windows\SysWOW64\selcjvkrxmlrbufzdeiubszlahncbhrkv.tuy aghst.exe File opened for modification C:\Windows\SysWOW64\ngusgzvjwsylccuvgo.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\awnofbarhgpfzcxbpaokb.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\xoawiztfqkozomcb.exe aghst.exe File opened for modification C:\Windows\SysWOW64\ewjgtlgtfafrhgxxh.exe aghst.exe File opened for modification C:\Windows\SysWOW64\ngusgzvjwsylccuvgo.exe aghst.exe File opened for modification C:\Windows\SysWOW64\ngusgzvjwsylccuvgo.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\rogiaxxpggqhcgchwixumo.exe aghst.exe File created C:\Windows\SysWOW64\bcyeabfbwaojiqqzsibcye.bfb aghst.exe File opened for modification C:\Windows\SysWOW64\yshgvpmbpmthzatvhqc.exe flvoztxypvf.exe File opened for modification C:\Windows\SysWOW64\lgwwmhfvkiqfyauxkuhc.exe flvoztxypvf.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\selcjvkrxmlrbufzdeiubszlahncbhrkv.tuy aghst.exe File opened for modification C:\Program Files (x86)\bcyeabfbwaojiqqzsibcye.bfb aghst.exe File created C:\Program Files (x86)\bcyeabfbwaojiqqzsibcye.bfb aghst.exe File opened for modification C:\Program Files (x86)\selcjvkrxmlrbufzdeiubszlahncbhrkv.tuy aghst.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\bcyeabfbwaojiqqzsibcye.bfb aghst.exe File opened for modification C:\Windows\xoawiztfqkozomcb.exe aghst.exe File opened for modification C:\Windows\ewjgtlgtfafrhgxxh.exe aghst.exe File opened for modification C:\Windows\awnofbarhgpfzcxbpaokb.exe aghst.exe File opened for modification C:\Windows\awnofbarhgpfzcxbpaokb.exe flvoztxypvf.exe File opened for modification C:\Windows\yshgvpmbpmthzatvhqc.exe aghst.exe File opened for modification C:\Windows\lgwwmhfvkiqfyauxkuhc.exe flvoztxypvf.exe File opened for modification C:\Windows\lgwwmhfvkiqfyauxkuhc.exe flvoztxypvf.exe File opened for modification C:\Windows\ngusgzvjwsylccuvgo.exe aghst.exe File opened for modification C:\Windows\yshgvpmbpmthzatvhqc.exe aghst.exe File opened for modification C:\Windows\lgwwmhfvkiqfyauxkuhc.exe aghst.exe File opened for modification C:\Windows\awnofbarhgpfzcxbpaokb.exe flvoztxypvf.exe File opened for modification C:\Windows\rogiaxxpggqhcgchwixumo.exe flvoztxypvf.exe File opened for modification C:\Windows\ewjgtlgtfafrhgxxh.exe aghst.exe File opened for modification C:\Windows\lgwwmhfvkiqfyauxkuhc.exe aghst.exe File opened for modification C:\Windows\rogiaxxpggqhcgchwixumo.exe aghst.exe File opened for modification C:\Windows\xoawiztfqkozomcb.exe aghst.exe File opened for modification C:\Windows\ewjgtlgtfafrhgxxh.exe flvoztxypvf.exe File opened for modification C:\Windows\yshgvpmbpmthzatvhqc.exe flvoztxypvf.exe File opened for modification C:\Windows\ngusgzvjwsylccuvgo.exe flvoztxypvf.exe File opened for modification C:\Windows\rogiaxxpggqhcgchwixumo.exe flvoztxypvf.exe File created C:\Windows\bcyeabfbwaojiqqzsibcye.bfb aghst.exe File opened for modification C:\Windows\selcjvkrxmlrbufzdeiubszlahncbhrkv.tuy aghst.exe File opened for modification C:\Windows\xoawiztfqkozomcb.exe flvoztxypvf.exe File opened for modification C:\Windows\ngusgzvjwsylccuvgo.exe aghst.exe File opened for modification C:\Windows\rogiaxxpggqhcgchwixumo.exe aghst.exe File opened for modification C:\Windows\yshgvpmbpmthzatvhqc.exe flvoztxypvf.exe File opened for modification C:\Windows\awnofbarhgpfzcxbpaokb.exe aghst.exe File created C:\Windows\selcjvkrxmlrbufzdeiubszlahncbhrkv.tuy aghst.exe File opened for modification C:\Windows\ewjgtlgtfafrhgxxh.exe flvoztxypvf.exe File opened for modification C:\Windows\xoawiztfqkozomcb.exe flvoztxypvf.exe File opened for modification C:\Windows\ngusgzvjwsylccuvgo.exe flvoztxypvf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 4676 aghst.exe 4676 aghst.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 4676 aghst.exe 4676 aghst.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe 3380 969b2dabe6080bc2da7236a0d455ced7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4676 aghst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4740 3380 969b2dabe6080bc2da7236a0d455ced7.exe 83 PID 3380 wrote to memory of 4740 3380 969b2dabe6080bc2da7236a0d455ced7.exe 83 PID 3380 wrote to memory of 4740 3380 969b2dabe6080bc2da7236a0d455ced7.exe 83 PID 4740 wrote to memory of 4676 4740 flvoztxypvf.exe 86 PID 4740 wrote to memory of 4676 4740 flvoztxypvf.exe 86 PID 4740 wrote to memory of 4676 4740 flvoztxypvf.exe 86 PID 4740 wrote to memory of 1788 4740 flvoztxypvf.exe 87 PID 4740 wrote to memory of 1788 4740 flvoztxypvf.exe 87 PID 4740 wrote to memory of 1788 4740 flvoztxypvf.exe 87 PID 3380 wrote to memory of 456 3380 969b2dabe6080bc2da7236a0d455ced7.exe 95 PID 3380 wrote to memory of 456 3380 969b2dabe6080bc2da7236a0d455ced7.exe 95 PID 3380 wrote to memory of 456 3380 969b2dabe6080bc2da7236a0d455ced7.exe 95 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" flvoztxypvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" aghst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" flvoztxypvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aghst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System flvoztxypvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aghst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" flvoztxypvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" flvoztxypvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aghst.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" flvoztxypvf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\969b2dabe6080bc2da7236a0d455ced7.exe"C:\Users\Admin\AppData\Local\Temp\969b2dabe6080bc2da7236a0d455ced7.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\flvoztxypvf.exe"C:\Users\Admin\AppData\Local\Temp\flvoztxypvf.exe" "c:\users\admin\appdata\local\temp\969b2dabe6080bc2da7236a0d455ced7.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\aghst.exe"C:\Users\Admin\AppData\Local\Temp\aghst.exe" "-C:\Users\Admin\AppData\Local\Temp\xoawiztfqkozomcb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\aghst.exe"C:\Users\Admin\AppData\Local\Temp\aghst.exe" "-C:\Users\Admin\AppData\Local\Temp\xoawiztfqkozomcb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\flvoztxypvf.exe"C:\Users\Admin\AppData\Local\Temp\flvoztxypvf.exe" "c:\users\admin\appdata\local\temp\969b2dabe6080bc2da7236a0d455ced7.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:456
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272B
MD5feff38e7c6d0f9bb2b5bc8735c48b0e0
SHA15b5ec8995f0b96fb4ff895baaf07f064c30cb242
SHA2568bc16cf887859aa3cc8054506da404c371493f285056e3a3d7010b4a8c6cf5b2
SHA51236d76b256c2ac1710db651804c440734734b4dc5d7418a814954f1f99c6079d7fdf2b14ba92b6b404377d06e96d8618dcb424894b177cbc80afe72338c958c73
-
Filesize
272B
MD56ffb8c5869abc640e8c5258d04d3b9be
SHA1795e51ff6fa7138bb2bdae143f91581c4281bea1
SHA2562899ed16e4d294eab55ebb81c409b06eb90e45d6e8c0034fc8fb6c5c950f0de3
SHA5128f94482c33ebfcfe136b3f0085e7805abb8b062497a3e8805defbee26f6ebc2658e445d4eecdadc342c14ac4f81088c6060fdda948c326e1463946236947f04e
-
Filesize
272B
MD5b27704ff7a7a5a7899c717d6ea4b4396
SHA1c3b7257f6209d874d60c84840f734e79088b6351
SHA256b6db702e3e120d70f47441610c4af281068e465fd92ee323801049b75a4c5dbe
SHA512e683b9bafd56870d6535772805e23a8aa25ba95ea3616c676b02a986ec46fb1c5ac48de8228c20de843e4ec6fbdaeee34648fffaa56d2e0a355aaddcb3a6d2bf
-
Filesize
272B
MD502232d2f17080f7ceaa7d0bb776b2857
SHA15b782191662e515fee283d120b2afa21e2716c19
SHA2569997edd491af4e58ef3fa872deae4652624feae5cdc818ebda342446a6a8bb76
SHA51231ee3cbd48775eae49c3216c130e4f5b0941bebcdcd874c8fbc84c0b0c4cb10fafeb9ff8da36dd8901a70a18a661ef0a867f6469a92862fbedfc5ffaf4864e0b
-
Filesize
708KB
MD59483844ca3cee37db28545d32ac73b01
SHA143eb3010bf7c5d56695d16815149261bb44a5de6
SHA2568f2a185b59feb6b4b7286a09fc2990e9f387e3f06e0482b7f4fb8d0abd35115c
SHA5121b53b4ccb7552b11de9d38cea20e9ce229c1c0b815d76a8dd14872ff0daa97aca3b426ba4b7b43526a887e473e1f4fcba5d4e33355c3b34ae2806f8a53f58c52
-
Filesize
320KB
MD5eb09c682903ecbd87f30b0366e008d8f
SHA159b0dc27c06ce536327490439a37751a3dbd5e38
SHA256c4b122f7bab30363b472a3dffb8a7c61604c0ec4719ebd233ccbac8be0951be1
SHA51283236c0955b81375666c10445d2cf5e4723b24e42e4ee5fb951f53945483be2fff5c8ef167f08cfad3accc162c61e750bb1039edbf09e26afe18cba2f994eb5d
-
Filesize
272B
MD5cf91d2851a207ea478712b1ca989b97f
SHA1c0bcf03394d4cc25e7e1e7673718d0d1b21cff55
SHA256bafbd877e6ef486dc4753d075e4028df0eabead9c1d1c1608c5ae818d8a4e122
SHA512b1c62a6937debdf331662de7a0fda8854c266da8edafe0256efa8345b40134758fca93cfc330c72e21dd524772630a9a61683e79061655b6535d9979c25b8675
-
Filesize
272B
MD526545e22851f6c2e97b661d316ec129b
SHA1b9681eae8acafd2f55b07cbd08eb89944de481d1
SHA256f55ded7683438a4cf5e3a8bbaddc2e955a7bc1c6fe174b04b53674252b7ee559
SHA5125072fc09ede84ce879cd5764e2c2e212a803b277d206004cd2972f71ba947255e12aedcf0ed6ab71a4d732f28cb3c6dbf898a760d3c7c1cf51dd23502a7ffca2
-
Filesize
272B
MD571548b50472335b033448fb32d536481
SHA16b648daf6cfaf7bfef844f6fc438923ec3a844b1
SHA256977cc7d54ff225ddc0f21a32971256bdf4ef1b6bc63ca39c7a80a84d06ef979b
SHA5123078f4ebb0220b100ac12d87a92f02496e9d8ea7e305e5609e44e035ee1ca3d8ec289ab4a59cddd0e95d7413b8bc074e796a230a43d30191b9438e67dd3cfe7e
-
Filesize
272B
MD50925dbc4b3487786b0649fae537f34f3
SHA1748762118d1fbe95ae8571cccc6f692070d5db22
SHA256b779ab43d1bb3fa611f3182518216e85e043b729df2ed0729a677d47f2d88bbf
SHA512676606d8825b402535085b523f2118a1131d7507cda4c38205e20033e8dbce967a5f2d6bb15a69143a391f6b3d2e7156599c9c78047c964ea52041086df1a65e
-
Filesize
3KB
MD58e9cb344253dd876fce8776f1bc89c8f
SHA19ff383d95c60d304d50a6592c8c4111d619a4026
SHA256b6a17459403780ccbfb2247ea28c0ded511fb58c369f53c6b1e5dd01bf6ea313
SHA512c2368fea6acec030e41290dbeeb59ff3efa431a11fa46f5b9828105894051e37468e1471e6e524adaa351b5415a14bea906a65ad459a860579f8ec662a6ef624
-
Filesize
480KB
MD5969b2dabe6080bc2da7236a0d455ced7
SHA1f2b4c9c70bbb5e11ec823846ad88a20c235775cd
SHA2564e7ae8c1b57d2178d7014c18b11a0d9ff1444f07d513ea8fdfa5af7a11f02873
SHA5121218dab072f3144304196c98f1b3c0494448929b8e6be35d5db88ef3dee0d0c12191f8cf3c94d8287195cde1af9a2a910a230d2e96f987e196e34ba00ae247c0
-
Filesize
656KB
MD57e938de0c77388d16cc8bc8a1188c4db
SHA1c27d1ac13a6dd2056f676e491110f94d19f247e1
SHA25683c73dcf4bd4bed3d1be4afdbc9825df9ea6f4ae7523a6bbb6afbc0a8b2c1f0d
SHA5123bccf9d49fb9c93baa869ccb57dbb83c67a96a925ac7a463c435bf12ec531272f5d0c3a3e208664b91f759506bae036c499e4d3656f5f9122a1153b99a7f855c