Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe
Resource
win10v2004-20250217-en
General
-
Target
82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe
-
Size
3.1MB
-
MD5
49736562f838b77d4965801d98452def
-
SHA1
5a6fed8a35c91f02672bc5b29f833d4e6ad53a89
-
SHA256
82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2
-
SHA512
bea46fe161a992419ecbe5754bf294f18a229e36d88fb8ee99c888b8d57c247a53b180a4e620b1b93043868535fdd8dcddb5f822486110ed37e6c9a8c82484f4
-
SSDEEP
49152:euWJCbWiLqRTNXYkier+1tgM68B1ECYJgkIlma2sx05tE:eugCSiwIPer+1tR68B+5JAmAxStE
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe -
Modifies registry class 59 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649} 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\Dwupwbuxh\ = "M^WdHF`" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\eamVCn\ = "x{MMuxiDRTznszWK~[v^ySMdwqJdB" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\mvueahwGpiiwa 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\qvrsUbqvlH\ = "vwGwWhCZpTmOc\\~l]JEdj\x7fd|hKuXpYgz" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\oYazHwSbwsla\ = "EJG`FTe`QtokQRDjocmFUxD" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ProgID 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\eamVCn 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\CsvAkexYv\ = "dbT[e}ODWnMgbnYWXhf" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\eamVCn\ = "x{MMuxiDRTznszWK~[v^ySMdwqKtB" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\Dwupwbuxh\ = "Mps~ChP" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\Dwupwbuxh\ = "MDtTcy`" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ = "%CommonProgramFiles%\\Microsoft Shared\\DAO\\dao360.dll" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\oYazHwSbwsla 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\yvphootfTzes\ = "p{A@]vezdnLcz^^\x7f" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\mvueahwGpiiwa\ = "QSkALttNQgiqSC^LTEXcX~j`ZtIu" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\mvueahwGpiiwa\ = "ix\\m_\x7fepoNbbzO]QxzRA\x7fQ|@tBzI" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Dwupwbuxh\ = "nc~jrSp" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\Dwupwbuxh\ = "MCsLuD@" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\CsvAkexYv 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Dwupwbuxh\ = "nMZpy}@" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Dwupwbuxh\ = "n~ZBOQP" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\mvueahwGpiiwa\ = "ix\\m_\x7fepoNbbzO]QxzRA\x7fQ|DtBzI" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\yvphootfTzes 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\Dwupwbuxh 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\eamVCn\ = "v[H~QdDleZdkMInsEBuBKrHgUWvoF" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\FleyDdVAeHciu 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\RuntimeVersion = "v1.0.3705" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\oYazHwSbwsla\ = "_`CPaEyiT]Wn{EtnWi[BivT" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\yvphootfTzes 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\Assembly = "dao, Version=10.0.4504.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\yvphootfTzes\ = "eQ_}xIvQmp_xdmzQ" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\eamVCn\ = "v[H~QdDleZd[MInsEBurKrHgUWw\x7fF" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\mvueahwGpiiwa\ = "QSkALttNQgiqSC^LTEXcX~jhZtIu" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Dwupwbuxh 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ = "DAO.User.36" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\FleyDdVAeHciu\ = "zkjBq{fLw_sHxlMsZ]\\c}RVO\x7fu|m|Fx{" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\mvueahwGpiiwa 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\FleyDdVAeHciu\ = "ByIGrzjr|n~mhIOyGnMu@rn{G{WjYDGP" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\mvueahwGpiiwa\ = "QSkALttNQgiqSC^LTEXcX~jdZtIu" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\ThreadingModel = "Apartment" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\mvueahwGpiiwa\ = "ix\\m_\x7fepoNbbzO]QxzRA\x7fQ|LtBzI" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC} 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\ProgID\ = "DAO.User.36" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\oYazHwSbwsla 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\CsvAkexYv\ = "jsUb@YuonT\x7fbIi[IuyL" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\qvrsUbqvlH 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\eamVCn 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\eamVCn\ = "x{MMuxiDRTz^szWK~[vnySMdwqKtB" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\eamVCn\ = "v[H~QdDleZd[MInsEBurKrHgUWvoF" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\qvrsUbqvlH\ = "vyyzrsdbCCNyoZDRMZDd{teh^QVNdEOR" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\FleyDdVAeHciu 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\mvueahwGpiiwa\ = "QSkALttNQgiqSC^LTEXcX~jlZtIu" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\mvueahwGpiiwa\ = "ix\\m_\x7fepoNbbzO]QxzRA\x7fQ|HtBzI" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\Dwupwbuxh\ = "ny]ZYlp" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\InprocServer32\Class = "dao.UserClass" 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{541EFA71-DA7B-AD33-A254-144AF5C89BCC}\qvrsUbqvlH 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\{BC2EA88B-14A5-13D1-B2E4-0060975B8649}\CsvAkexYv 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:BC2EA88B 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe File opened for modification C:\ProgramData\TEMP:BC2EA88B 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4392 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Token: SeIncBasePriorityPrivilege 4392 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Token: 33 2060 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe Token: SeIncBasePriorityPrivilege 2060 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4392 wrote to memory of 2060 4392 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe 94 PID 4392 wrote to memory of 2060 4392 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe 94 PID 4392 wrote to memory of 2060 4392 82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe"C:\Users\Admin\AppData\Local\Temp\82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe"C:\Users\Admin\AppData\Local\Temp\82f2b4a9efe71dbaebd47d6a5f0f4f81ea5e107610745f12373bd706ab01eaa2.exe"2⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD502d63f90451f71e73bfeef77e2de138a
SHA1e741a3fd7a021b744290c7217b6ae2e154065843
SHA2565efdf6f602a7be37dc0fcaf26fb784c06920953e4e42fa0452b2dbb091ccaa64
SHA51267b855eaf8e5dac35fe84664dff7cd88d318ac4e36aca0a5bfdac255f2b8b25d20c255ef8d1ba1852f9fb1b1f807f7bce304f1b4b77c044d1992ecbe09c600f9