Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
b571cd68c97f16598cd6a75f9c68e471.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b571cd68c97f16598cd6a75f9c68e471.exe
Resource
win10v2004-20240226-en
General
-
Target
b571cd68c97f16598cd6a75f9c68e471.exe
-
Size
644KB
-
MD5
b571cd68c97f16598cd6a75f9c68e471
-
SHA1
e9140a31d28af6033dd9e58f73b2e1891dafda6d
-
SHA256
dc1b07a52af475827944cf1bdd0c8468fe428e5cece300227ca3c54ebc5e3e65
-
SHA512
3b348101ca228acb557dc851d4192ea71aad03fc50298e494c464148b8a4170724e297381b92d4f1a6f5d2ad1a9712ba4b7175986e4d965bc6ce46e9119ce53b
-
SSDEEP
12288:PKr3QboC9qLGKgZKe4HYpHvcbTUT+tLEGz//:PQ3QbiGL8LwH18
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" gugcvwzjqeq.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" vhptahs.exe -
Adds policy Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ihctnhfyqxupuwgslkje.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "ihctnhfyqxupuwgslkje.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "vtndwpmevbxrvwfqige.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khaphzvmchcvyygqhe.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\upgtjztiwzsjkiow.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "upgtjztiwzsjkiow.exe" gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe" vhptahs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "upgtjztiwzsjkiow.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bxpdulgwlpjbdcjsi.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "upgtjztiwzsjkiow.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "ihctnhfyqxupuwgslkje.exe" gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe" gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "khaphzvmchcvyygqhe.exe" vhptahs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "khaphzvmchcvyygqhe.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vtndwpmevbxrvwfqige.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "ihctnhfyqxupuwgslkje.exe" vhptahs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run gugcvwzjqeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "xxtlgbaunvtpvyjwqqqme.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kxgltbnu = "vtndwpmevbxrvwfqige.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vtndwpmevbxrvwfqige.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bxpdulgwlpjbdcjsi.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khaphzvmchcvyygqhe.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\xhnpu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ihctnhfyqxupuwgslkje.exe" gugcvwzjqeq.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gugcvwzjqeq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vhptahs.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vhptahs.exe -
Executes dropped EXE 4 IoCs
pid Process 2264 gugcvwzjqeq.exe 2484 vhptahs.exe 2636 vhptahs.exe 2532 gugcvwzjqeq.exe -
Loads dropped DLL 8 IoCs
pid Process 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2264 gugcvwzjqeq.exe 2264 gugcvwzjqeq.exe 2264 gugcvwzjqeq.exe 2264 gugcvwzjqeq.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "ihctnhfyqxupuwgslkje.exe" gugcvwzjqeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\itadjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khaphzvmchcvyygqhe.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mdqzlxnyihwj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bxpdulgwlpjbdcjsi.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfrzkvkudbp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\itadjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\upgtjztiwzsjkiow.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "upgtjztiwzsjkiow.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\itadjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khaphzvmchcvyygqhe.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfrzkvkudbp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vtndwpmevbxrvwfqige.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vtndwpmevbxrvwfqige.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "xxtlgbaunvtpvyjwqqqme.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vtndwpmevbxrvwfqige.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bxpdulgwlpjbdcjsi.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "ihctnhfyqxupuwgslkje.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfrzkvkudbp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vtndwpmevbxrvwfqige.exe ." gugcvwzjqeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "xxtlgbaunvtpvyjwqqqme.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "vtndwpmevbxrvwfqige.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\bpzfoxksz = "upgtjztiwzsjkiow.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "bxpdulgwlpjbdcjsi.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "upgtjztiwzsjkiow.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "upgtjztiwzsjkiow.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "vtndwpmevbxrvwfqige.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\itadjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe" gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mdqzlxnyihwj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khaphzvmchcvyygqhe.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "vtndwpmevbxrvwfqige.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfrzkvkudbp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khaphzvmchcvyygqhe.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mdqzlxnyihwj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khaphzvmchcvyygqhe.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfrzkvkudbp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\upgtjztiwzsjkiow.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mdqzlxnyihwj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ihctnhfyqxupuwgslkje.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfrzkvkudbp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe ." gugcvwzjqeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\bpzfoxksz = "ihctnhfyqxupuwgslkje.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\itadjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ihctnhfyqxupuwgslkje.exe" gugcvwzjqeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "vtndwpmevbxrvwfqige.exe ." gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "upgtjztiwzsjkiow.exe" gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mdqzlxnyihwj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bxpdulgwlpjbdcjsi.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "ihctnhfyqxupuwgslkje.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\itadjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vtndwpmevbxrvwfqige.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "upgtjztiwzsjkiow.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "ihctnhfyqxupuwgslkje.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\bpzfoxksz = "upgtjztiwzsjkiow.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "upgtjztiwzsjkiow.exe ." gugcvwzjqeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\itadjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\bpzfoxksz = "ihctnhfyqxupuwgslkje.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mdqzlxnyihwj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xxtlgbaunvtpvyjwqqqme.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mdqzlxnyihwj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vtndwpmevbxrvwfqige.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfrzkvkudbp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vtndwpmevbxrvwfqige.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\bpzfoxksz = "xxtlgbaunvtpvyjwqqqme.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\bpzfoxksz = "bxpdulgwlpjbdcjsi.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "khaphzvmchcvyygqhe.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "ihctnhfyqxupuwgslkje.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "upgtjztiwzsjkiow.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bxpdulgwlpjbdcjsi.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "bxpdulgwlpjbdcjsi.exe ." vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\itadjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ihctnhfyqxupuwgslkje.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ujublvjsax = "ihctnhfyqxupuwgslkje.exe ." gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "ihctnhfyqxupuwgslkje.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "bxpdulgwlpjbdcjsi.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "vtndwpmevbxrvwfqige.exe ." vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mdqzlxnyihwj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\upgtjztiwzsjkiow.exe" vhptahs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "xxtlgbaunvtpvyjwqqqme.exe ." gugcvwzjqeq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khaphzvmchcvyygqhe.exe ." gugcvwzjqeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\itadjp = "xxtlgbaunvtpvyjwqqqme.exe" vhptahs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vhptahs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\upgtjztiwzsjkiow.exe ." vhptahs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vhptahs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vhptahs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gugcvwzjqeq.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gugcvwzjqeq.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 whatismyip.everdot.org 6 www.showmyipaddress.com 9 whatismyipaddress.com -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf vhptahs.exe File created C:\autorun.inf vhptahs.exe File opened for modification F:\autorun.inf vhptahs.exe File created F:\autorun.inf vhptahs.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\khaphzvmchcvyygqhe.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\ihctnhfyqxupuwgslkje.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\ihctnhfyqxupuwgslkje.exe vhptahs.exe File created C:\Windows\SysWOW64\oxcdhltwypwbqcwsvenstxbjmo.mrg vhptahs.exe File opened for modification C:\Windows\SysWOW64\bxpdulgwlpjbdcjsi.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\khaphzvmchcvyygqhe.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\bxpdulgwlpjbdcjsi.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\vtndwpmevbxrvwfqige.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\opmfbxxsmvurycocxyzwpl.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\upgtjztiwzsjkiow.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\vtndwpmevbxrvwfqige.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\upgtjztiwzsjkiow.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\xxtlgbaunvtpvyjwqqqme.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\xxtlgbaunvtpvyjwqqqme.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\opmfbxxsmvurycocxyzwpl.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\opmfbxxsmvurycocxyzwpl.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\bxpdulgwlpjbdcjsi.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\vtndwpmevbxrvwfqige.exe vhptahs.exe File created C:\Windows\SysWOW64\pjzlapiwjldttqvcqkeugvkdregyoolqxlfzp.qfy vhptahs.exe File opened for modification C:\Windows\SysWOW64\upgtjztiwzsjkiow.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\opmfbxxsmvurycocxyzwpl.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\upgtjztiwzsjkiow.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\khaphzvmchcvyygqhe.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\xxtlgbaunvtpvyjwqqqme.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\ihctnhfyqxupuwgslkje.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\oxcdhltwypwbqcwsvenstxbjmo.mrg vhptahs.exe File opened for modification C:\Windows\SysWOW64\xxtlgbaunvtpvyjwqqqme.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\vtndwpmevbxrvwfqige.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\ihctnhfyqxupuwgslkje.exe gugcvwzjqeq.exe File opened for modification C:\Windows\SysWOW64\khaphzvmchcvyygqhe.exe vhptahs.exe File opened for modification C:\Windows\SysWOW64\pjzlapiwjldttqvcqkeugvkdregyoolqxlfzp.qfy vhptahs.exe File opened for modification C:\Windows\SysWOW64\bxpdulgwlpjbdcjsi.exe gugcvwzjqeq.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\pjzlapiwjldttqvcqkeugvkdregyoolqxlfzp.qfy vhptahs.exe File created C:\Program Files (x86)\pjzlapiwjldttqvcqkeugvkdregyoolqxlfzp.qfy vhptahs.exe File opened for modification C:\Program Files (x86)\oxcdhltwypwbqcwsvenstxbjmo.mrg vhptahs.exe File created C:\Program Files (x86)\oxcdhltwypwbqcwsvenstxbjmo.mrg vhptahs.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\upgtjztiwzsjkiow.exe vhptahs.exe File opened for modification C:\Windows\pjzlapiwjldttqvcqkeugvkdregyoolqxlfzp.qfy vhptahs.exe File created C:\Windows\pjzlapiwjldttqvcqkeugvkdregyoolqxlfzp.qfy vhptahs.exe File opened for modification C:\Windows\upgtjztiwzsjkiow.exe gugcvwzjqeq.exe File opened for modification C:\Windows\xxtlgbaunvtpvyjwqqqme.exe gugcvwzjqeq.exe File opened for modification C:\Windows\upgtjztiwzsjkiow.exe gugcvwzjqeq.exe File opened for modification C:\Windows\bxpdulgwlpjbdcjsi.exe vhptahs.exe File opened for modification C:\Windows\khaphzvmchcvyygqhe.exe vhptahs.exe File created C:\Windows\oxcdhltwypwbqcwsvenstxbjmo.mrg vhptahs.exe File opened for modification C:\Windows\xxtlgbaunvtpvyjwqqqme.exe vhptahs.exe File opened for modification C:\Windows\vtndwpmevbxrvwfqige.exe vhptahs.exe File opened for modification C:\Windows\xxtlgbaunvtpvyjwqqqme.exe vhptahs.exe File opened for modification C:\Windows\khaphzvmchcvyygqhe.exe gugcvwzjqeq.exe File opened for modification C:\Windows\oxcdhltwypwbqcwsvenstxbjmo.mrg vhptahs.exe File opened for modification C:\Windows\vtndwpmevbxrvwfqige.exe gugcvwzjqeq.exe File opened for modification C:\Windows\ihctnhfyqxupuwgslkje.exe gugcvwzjqeq.exe File opened for modification C:\Windows\bxpdulgwlpjbdcjsi.exe gugcvwzjqeq.exe File opened for modification C:\Windows\opmfbxxsmvurycocxyzwpl.exe gugcvwzjqeq.exe File opened for modification C:\Windows\ihctnhfyqxupuwgslkje.exe vhptahs.exe File opened for modification C:\Windows\upgtjztiwzsjkiow.exe vhptahs.exe File opened for modification C:\Windows\vtndwpmevbxrvwfqige.exe gugcvwzjqeq.exe File opened for modification C:\Windows\xxtlgbaunvtpvyjwqqqme.exe gugcvwzjqeq.exe File opened for modification C:\Windows\bxpdulgwlpjbdcjsi.exe vhptahs.exe File opened for modification C:\Windows\bxpdulgwlpjbdcjsi.exe gugcvwzjqeq.exe File opened for modification C:\Windows\opmfbxxsmvurycocxyzwpl.exe gugcvwzjqeq.exe File opened for modification C:\Windows\khaphzvmchcvyygqhe.exe gugcvwzjqeq.exe File opened for modification C:\Windows\khaphzvmchcvyygqhe.exe vhptahs.exe File opened for modification C:\Windows\vtndwpmevbxrvwfqige.exe vhptahs.exe File opened for modification C:\Windows\ihctnhfyqxupuwgslkje.exe vhptahs.exe File opened for modification C:\Windows\ihctnhfyqxupuwgslkje.exe gugcvwzjqeq.exe File opened for modification C:\Windows\opmfbxxsmvurycocxyzwpl.exe vhptahs.exe File opened for modification C:\Windows\opmfbxxsmvurycocxyzwpl.exe vhptahs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 1756 b571cd68c97f16598cd6a75f9c68e471.exe 2484 vhptahs.exe 2484 vhptahs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 vhptahs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2264 1756 b571cd68c97f16598cd6a75f9c68e471.exe 28 PID 1756 wrote to memory of 2264 1756 b571cd68c97f16598cd6a75f9c68e471.exe 28 PID 1756 wrote to memory of 2264 1756 b571cd68c97f16598cd6a75f9c68e471.exe 28 PID 1756 wrote to memory of 2264 1756 b571cd68c97f16598cd6a75f9c68e471.exe 28 PID 2264 wrote to memory of 2484 2264 gugcvwzjqeq.exe 29 PID 2264 wrote to memory of 2484 2264 gugcvwzjqeq.exe 29 PID 2264 wrote to memory of 2484 2264 gugcvwzjqeq.exe 29 PID 2264 wrote to memory of 2484 2264 gugcvwzjqeq.exe 29 PID 2264 wrote to memory of 2636 2264 gugcvwzjqeq.exe 30 PID 2264 wrote to memory of 2636 2264 gugcvwzjqeq.exe 30 PID 2264 wrote to memory of 2636 2264 gugcvwzjqeq.exe 30 PID 2264 wrote to memory of 2636 2264 gugcvwzjqeq.exe 30 PID 1756 wrote to memory of 2532 1756 b571cd68c97f16598cd6a75f9c68e471.exe 33 PID 1756 wrote to memory of 2532 1756 b571cd68c97f16598cd6a75f9c68e471.exe 33 PID 1756 wrote to memory of 2532 1756 b571cd68c97f16598cd6a75f9c68e471.exe 33 PID 1756 wrote to memory of 2532 1756 b571cd68c97f16598cd6a75f9c68e471.exe 33 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" gugcvwzjqeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" vhptahs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer vhptahs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gugcvwzjqeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gugcvwzjqeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" vhptahs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" gugcvwzjqeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" gugcvwzjqeq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" vhptahs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" vhptahs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b571cd68c97f16598cd6a75f9c68e471.exe"C:\Users\Admin\AppData\Local\Temp\b571cd68c97f16598cd6a75f9c68e471.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\gugcvwzjqeq.exe"C:\Users\Admin\AppData\Local\Temp\gugcvwzjqeq.exe" "c:\users\admin\appdata\local\temp\b571cd68c97f16598cd6a75f9c68e471.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\vhptahs.exe"C:\Users\Admin\AppData\Local\Temp\vhptahs.exe" "-C:\Users\Admin\AppData\Local\Temp\upgtjztiwzsjkiow.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\vhptahs.exe"C:\Users\Admin\AppData\Local\Temp\vhptahs.exe" "-C:\Users\Admin\AppData\Local\Temp\upgtjztiwzsjkiow.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2636
-
-
-
C:\Users\Admin\AppData\Local\Temp\gugcvwzjqeq.exe"C:\Users\Admin\AppData\Local\Temp\gugcvwzjqeq.exe" "c:\users\admin\appdata\local\temp\b571cd68c97f16598cd6a75f9c68e471.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5613e9d1d97ecee1a75c1f6a350c21546
SHA1e650308d6586ae5f6404a16147513625c396b118
SHA256ba34e07556af23ac90adc84fa0870f7686e31b9b74ee9209dd1326051712a3a4
SHA5126f5da9176d1e524a6bd4becda64c406842e7bf2f8e23fd4131d8784947aba840c1d16ad4a679b87656bf4a81180f266f7b5ff831f2800c79522d9527edb779cd
-
Filesize
280B
MD569afc25cd3bb88a12af84b8d9c47cf24
SHA10f9925e1cbf504ccf82a7e46b30cc229cd8e5ab3
SHA2566d8caff8a35dcc592db25dbbc0184f703cd45052db6e2264d2be48bb5d51c1ae
SHA512c8394b4553073166129cab9d794cfae8286655832af503914ba3d58698fa3b2967c458871c29e0151df38dc2641107b1697661ffc5da8493a0708bb67821eb2c
-
Filesize
280B
MD50e6c8e7876fa4ee7b00568c2895ed683
SHA10333108f634e493b5bccdfe00b8e5fd3f698de10
SHA2567298e123ee46568312f8fd43163f8d6f3cfdcdd052b75c598887cc0d0fab88c3
SHA51286aafdbe7403dcbe92444d0590a76e36f84d4b308954b70b1a76134b2bc857ba6efdb80460197bb0ce701ec124ccdafb82ea63f0792bc5897471278bd6a6c9a4
-
Filesize
443KB
MD519d7b91cd588ffe6f3641a0efbc749e0
SHA1084400ba5cea6372724a5123369ad9ec70e6dc48
SHA256f09658e48880b0e0ce5e3d923e39d8762b2e7f9b1a1d635d079c67c78973b360
SHA5127fc4d97f21ee4a2aa356e3904a9b34e84f1ac0a7e7e32bcc7142b6db657aaa3615e81fe2d1edf4623be4f6511ba597d9bda7648c38694554b53f4beb6c2ece53
-
Filesize
308KB
MD51ea898a57321190d46469f4b0b51308e
SHA171141f8773b98db3d1ffbe9c1b34b29f9129e1b0
SHA2566185c634fc69d7243a59553f3f6a3ec3df7d08fca921d802e50cd790f478f8dc
SHA512f114a7bce61686da888fc6fab5c87ea2c15ef953da236151456935a48b3b7bd170cdf64b209bbd21d53072e76bf410ae0a535e29e9b5b97b5983da7b76df6b86
-
Filesize
448KB
MD556a2ff5e249d6a33856374836dcc6c52
SHA19e39b0a4b01a415ca7347aa9663259ff5ed676c9
SHA25617bf80c8af0658a54c4c583fe8724d60b5dcb4c35fdc36615320b42a5cd116ec
SHA5129dad5e00ba4abe11e939ccbacd21d0594d6f884c150f6d3fff48b06024dfb0d8edd684d624bfa4da90f3863fd273591704a8b468111d37843e6193b59991308a
-
Filesize
250KB
MD51730abe19f289f9c22259421dda3c443
SHA17c2568c79276f4b6e29a1db69fa28027136bcf8c
SHA2568c0c0bbcee98d67c3e0771a875c72f6b21b4286027402af26faa4feefc062639
SHA5124a38de61d97ca0342670b21edad6c711eb7b644b7865b06816e468c3f31e9399f4ea8830d5ab8f7b77705b99c2ba916d54108bb87dc5bb956ef5758538704dea
-
Filesize
427KB
MD57f1508d17bac6f0f9a4e28339be4e116
SHA117c51cbda7ba269bec5113d968b2d677abef7a4d
SHA256f411e23e8aea31d18d9dbdf1b89a41e038406205a9125d9b619ebff82545368a
SHA512fdfa4a2db5e22e13a1cedac1aa765974221798437b81b798f6b80f9bac597c1bfbf72a13f3eeab46cd51bc87893fd9c6b2b626d35500b572bdde348fb4371f2a
-
Filesize
272KB
MD59275a504cf85e7c77f66b80813d8116e
SHA15663b302151d38b565dae4600f73b64978a171a9
SHA256e29b30766ede0ee4445cd51acb092aa7a33426b1956f45ab27f7623ca6e4139c
SHA5123adc8a0593af511decd10f48282e65b4122117036f95b5c500d9b5b43c33063f676be817c580524484096e55ecdd9a11bc353503ce8d61c0f0cf751fc299f7f8
-
Filesize
280B
MD57382d8bcded67e7e76d9c869ebd2d2c4
SHA1f5e4c4d49a19ffa7315428c6c7e388167a9e7623
SHA25644683b782052d980c55dcc12bfc53744e175cac801aa63c26a92111e60b58ee6
SHA5127a8e2bdd0d0774b89ba92ee083f9d3b12284af9260fbac035108a5068ef50f06961e4c9a2a602bda9d92a4abe9831128385540d60f9dff65a27502eab3f80f4a
-
Filesize
280B
MD52688571caa3ef85ade53c0b7deed4ac0
SHA14b30315e039e25b9e151ba781ef3a2ac4565c4ee
SHA2566cf323f999675a9c173d0a7f192a1ce65983fe97848fe5b6506971f8bdd0368b
SHA512a95f12ec718ace9d93b1bd3e37d020f68f128d11f52f12ca2cf77fdef81e17bec1b510fc100a47007bc589f2547ade881bacd60e64ea44b1ca9887071d5967c2
-
Filesize
280B
MD51288be451686fd77aa54351904a6842a
SHA1eaab7f1c80e54a9d4b49ca577dcde4013cdb6e78
SHA25651133b94ac78c4822e306658fc135c7cbad99514d195d91d5aef69f2e98b21e3
SHA51215cbe397e6fdf2ec7fd968f89ba282121b6fb1db5c0d77107cd2b7aec684740e567c1eb7735ba714a636fb4da7215927beb8025f1aafa0a077f44d684aaba37b
-
Filesize
4KB
MD59bac2d5aef9bfff36d4ea2eeea47c6b3
SHA11b80bd80223d1aab2a31b71e19ddda6ac38f1152
SHA2562212acce6439d50d1a07178b68bdce1d17ac9ecf13409fd1412a4b1b326ae5be
SHA51274d77c5b713fd7ef7627d6d1f79d53438806639a74cdc15b621afb6e51a6fe0b0937d9187e344ed886b01363e725cd9b8e0639b33c7916d3fe2df348ea644cc1
-
Filesize
644KB
MD5b571cd68c97f16598cd6a75f9c68e471
SHA1e9140a31d28af6033dd9e58f73b2e1891dafda6d
SHA256dc1b07a52af475827944cf1bdd0c8468fe428e5cece300227ca3c54ebc5e3e65
SHA5123b348101ca228acb557dc851d4192ea71aad03fc50298e494c464148b8a4170724e297381b92d4f1a6f5d2ad1a9712ba4b7175986e4d965bc6ce46e9119ce53b
-
Filesize
256KB
MD5842c85b203e7ab672e286ecc52f76076
SHA17775c72613f530f6a247f8d0fdac4134e40f2991
SHA2564bebcfc259fc9d0cade01c56aa0f9debd166256140c56e24889fcb751575d0d0
SHA512c4eb7a68f332e746c680229994bb3c57a59ace41b95068223c21074ebfec6e9399e123cf49e8ffe1d9d5023b4cbf806d33d9d6eb7355a13c130fb91bc630896d
-
Filesize
204KB
MD56e842d944e38b8b8b054e52b2a1c4b3e
SHA11a1d931500db39db82e87410daaca12f80b1e484
SHA256673d33c0f11a5280a6761aadfaee337ec055f357830d385cba51a38bd40a1a14
SHA512bdb9d9d5a3b5708f1cd892cac3b95801dcc6bb291d83181db53382cd5a76bf1f403cee6a722915a473683214ca04cec932607eed84a87fd49e40669bdb9d983a
-
Filesize
267KB
MD52d17aea069b6a964340f0f7c5c8b6552
SHA1ff7c0a4c6bcd05dd75257c61d9978231b2bee872
SHA256c5d83bd4091aeb9b433c0c0c3152cdccb14c2566ca8268847d4db9a7d76cdad9
SHA51206baaa4ad7809628c607a267314993d17348519ec26c203afbe5414dc1aa0f4123d21f9cab6ddba0d3313000173092c3efd94d5134899510f1c2a93fbff504f8
-
Filesize
467KB
MD5a6fdf8f567ecc72160c5b3f699ebf34f
SHA1f72446606e4c76da53569a6507fa3e60e3c4141b
SHA2561509b5d75eefe84a32393d763da0ec8f3bca65f8988e6508a6e3aace6e9eeb48
SHA512176ab03ce039cc55f71caf2f8144d94c115c3ee290e37b6c78f3f22ae34bdf992a00e6979dcb76c3d68ed2ce082713e3d1830aa61473b13ed8c791e2d6431b91
-
Filesize
300KB
MD56b8275b01a0e1a0b2e3387d715270eed
SHA167a9670ba867459fbfac8ccf5d77f26853f61586
SHA2561a650d89830e24b2f99f846c55574c3281853386197c2ab1fb705ee584adc377
SHA5126cddcb060832403dfda6f78fc0066302b9c27338c10a015385130da31b7bbbfecef8c018e9eb973326f029c23633ed8e28aea68ae68941711a78ff627e9b2a59
-
Filesize
320KB
MD54866c43862059f5987ff89abef36ec0c
SHA1bb432ce3d40065a40c8ded41269ba7232b1e5eae
SHA25697a0ab0792f22efc4eac75ec747ea34b74db4422ebc51a6573a007e774309b48
SHA512d66a159e205e9c0879b60af9481341f18ce8b95445e9f5c6dc0964e98998253407c3edbc1a595c4ffd406f53a85de23297bacf9ab77bbdcd97b0a5a1a691dad8
-
Filesize
384KB
MD53f472e503d6a0df955af258d4f45fb7f
SHA123c3899e7ea18bfe93a5fc53a4e3086b83831134
SHA256aff3e2ba588d90d5bd97f6960ed7df3d0932b685c58a15ddcb22da2849722734
SHA512bed5b9f60441533092407114577a6a5a49adbe3f5127d0cb209b33e31dddcda2fbb3d9f029c8fa4fbd68c16bc430721c500128c8d91e74127cb276dac5ec7d9f
-
Filesize
310KB
MD5ed53c756ad3974ce991e35aa1e5fde6a
SHA12da93df2c4f6d755390decbb7f16dad5c7ec6960
SHA25615d79dafc00396f3ad03bdd7c706af66a2d98aa16f14c7fafc549a805332991a
SHA512494c5d2eeccf127d16894f7a0eac30f01ff8dcfa1db53b370bf19aadce9475234861d8f0e0106caf71b2d0518dc33150e1ec32463090acc66178b8c176cf19d8
-
Filesize
319KB
MD59da792058a33683b8fc4723598ca7ef3
SHA171358437f44c4ed80a9e2d1e52c5887aa545a60c
SHA2569633e5fb97fd4fdb59ca048a12406d95c8680a887ad1680444541301edbf9f28
SHA5125a78843c2df2c9f82b202df02f4ab7a7d89fe7313d16f0b9443ca510bc678a9416ed6fee1b2f34c5ba577166c3dc4c50f555d23d82b137920f94625d447b81bd
-
Filesize
320KB
MD54dd2521e06dfa5ab3d122ff9d72ca9f7
SHA186e1b1b3ce06cd51dd28db1dbaba571c8bc433a8
SHA256b439461ca0a9a58a3d784d31cda91ec7a1e8c5561c4878daaf968f0092b8bef3
SHA512914709ed90f28ddc6115ce2ded4a8b8f531676300402fabc366ece636f4c65961c269196f42dd73f339b5a42b331135eeecbd6cfac63812560fb7739485ac995
-
Filesize
712KB
MD548f3ac3a7c0fb727301ae4e39be97d71
SHA18523a207b728c44ce0b76aa2ebfa67a51b4feccd
SHA2563c377c559eb1628f1a066ed88e5f65fde402498eec154a5e7e55f85f3ef521cb
SHA512e36d5c9a5b46d2017b93065ec3fbb638f3a42166c66bade497ad129b783c68f81c5d674142bd52e235b830616167ed7fa06bfb2329d9ae7fca5c64efb1133640