Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10_x64 -
resource
win10v200410 -
submitted
28-04-2020 11:54
Static task
static1
Behavioral task
behavioral1
Sample
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe
Resource
win7v200410
Behavioral task
behavioral2
Sample
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe
Resource
win10v200410
General
-
Target
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe
-
Size
34KB
-
MD5
eaf04bb5f9fff5b07b81bede9a3ea549
-
SHA1
62d1c4da546502605c23d01d050bb63cf4c18022
-
SHA256
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237
-
SHA512
140407b691d73daab459003b7402af252c648756ea2f1cbc785fd9ec64c2432b0d0588f97c2beef629914998d7f78698a03aa0beab914bd0f7baba15fb5571d6
Malware Config
Extracted
C:\readme-warning.txt
makop
n0pr0blems@protonmail.com
troubleshooter@cock.li
Signatures
-
Makop
Ransomware family discovered by @VK_Intel in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 3528 created 1876 3528 svchost.exe ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 3568 bcdedit.exe 3464 bcdedit.exe -
Processes:
wbadmin.exepid process 3696 wbadmin.exe -
Modifies Installed Components in the registry 2 TTPs
-
Drops startup file 1 IoCs
Processes:
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Software\Microsoft\Windows\CurrentVersion\Run\1 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe\"" ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exeexplorer.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-2136578390-2771164089-400866267-1000\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu Places\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-2136578390-2771164089-400866267-1000\desktop.ini explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Documents\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Public\Pictures\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Public\Videos\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Public\Libraries\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Public\Desktop\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Public\Documents\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini explorer.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Searches\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Videos\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Public\Downloads\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Links\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Public\Music\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Public\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 64 IoCs
Processes:
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exedescription ioc process File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psm1 ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Grace-ul-oob.xrm-ms ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\7734_32x32x32.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_1.0.16328.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-36_altform-unplated.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pt-br\AppStore_icon.svg ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui_5.5.0.165303.jar ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\premium_background_icon.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-phn.xrm-ms ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-24_contrast-black.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\SharpDXEngine\Rendering\Shaders\Builtin\Bin\LightedTextured_PixelLighting_VS.fxo ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\3899_32x32x32.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.Tests.ps1 ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup_ja.jar ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest5-ppd.xrm-ms ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\HowToPlay\TriPeaks\Control_1.jpg ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1.10531.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-32.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\SmallTile.scale-100.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\SmallTile.scale-200.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\SmallTile.scale-200.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\about.html ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Retail-ul-phn.xrm-ms ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TEXTCONV\RECOVR32.CNV ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_reportabuse-default_18.svg ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\digsig_icons.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\home-selector.css ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_checkbox_unselected_18.svg ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\OperationValidationResources.psd1 ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Trial-ul-oob.xrm-ms ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msgr8fr.dub ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\SmallTile.scale-100.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-40.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\nl_get.svg ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\Catalog\paperboat.3mf ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Audio\Click_G.wav ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11701.1001.87.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreAppList.scale-100.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\hive.xsl ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Emoticons\small\wait.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarMediumTile.scale-100.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\tr-tr\ui-strings.js ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app_1.0.300.v20140228-1829.jar ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-white\LargeTile.scale-125.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\TEE\Url.ot ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\s_filter_18.svg ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\178.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_joined.gif ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2017.125.40.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\GamePlayAssets\Localization\localized_RO-RO.respack ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-30_altform-unplated.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\Images\LayersControl\Road.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\da-dk\ui-strings.js ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\Set-TestInconclusive.ps1 ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_neutral_split.scale-140_8wekyb3d8bbwe\Assets\Office\PlaneCutKeepTop.scale-140.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Icons\support.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\GamePlayAssets\Localization\localized_NL-NL.respack ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\ROMAN.TXT ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_KMS_ClientC2R-ppd.xrm-ms ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-256_altform-unplated_contrast-black.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\osf\agavedefaulticon32x32.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\HowToPlay\Pyramid\Goal_5.jpg ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\animations\OneNoteFRE_ClipAndAdd_LTR_Tablet.mp4 ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-templates.xml ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\LargeTile.scale-100.png ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1500 3000 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 16 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exevds.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3392 vssadmin.exe -
Modifies Control Panel 5 IoCs
Processes:
explorer.exeSearchUI.exeShellExperienceHost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Control Panel\Desktop\LastUpdated = "4294967295" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Control Panel\Colors SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Control Panel\Colors ShellExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Control Panel\Desktop explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Control Panel\Desktop\TranscodedImageCount = "1" explorer.exe -
Modifies registry class 33 IoCs
Processes:
explorer.exeSearchUI.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "129" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "0" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "0" SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "132310232044319178" explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exevssvc.exeWMIC.exewbengine.exeWerFault.exeexplorer.exedescription pid process Token: SeTcbPrivilege 3528 svchost.exe Token: SeTcbPrivilege 3528 svchost.exe Token: SeBackupPrivilege 1600 vssvc.exe Token: SeRestorePrivilege 1600 vssvc.exe Token: SeAuditPrivilege 1600 vssvc.exe Token: SeIncreaseQuotaPrivilege 3824 WMIC.exe Token: SeSecurityPrivilege 3824 WMIC.exe Token: SeTakeOwnershipPrivilege 3824 WMIC.exe Token: SeLoadDriverPrivilege 3824 WMIC.exe Token: SeSystemProfilePrivilege 3824 WMIC.exe Token: SeSystemtimePrivilege 3824 WMIC.exe Token: SeProfSingleProcessPrivilege 3824 WMIC.exe Token: SeIncBasePriorityPrivilege 3824 WMIC.exe Token: SeCreatePagefilePrivilege 3824 WMIC.exe Token: SeBackupPrivilege 3824 WMIC.exe Token: SeRestorePrivilege 3824 WMIC.exe Token: SeShutdownPrivilege 3824 WMIC.exe Token: SeDebugPrivilege 3824 WMIC.exe Token: SeSystemEnvironmentPrivilege 3824 WMIC.exe Token: SeRemoteShutdownPrivilege 3824 WMIC.exe Token: SeUndockPrivilege 3824 WMIC.exe Token: SeManageVolumePrivilege 3824 WMIC.exe Token: 33 3824 WMIC.exe Token: 34 3824 WMIC.exe Token: 35 3824 WMIC.exe Token: 36 3824 WMIC.exe Token: SeIncreaseQuotaPrivilege 3824 WMIC.exe Token: SeSecurityPrivilege 3824 WMIC.exe Token: SeTakeOwnershipPrivilege 3824 WMIC.exe Token: SeLoadDriverPrivilege 3824 WMIC.exe Token: SeSystemProfilePrivilege 3824 WMIC.exe Token: SeSystemtimePrivilege 3824 WMIC.exe Token: SeProfSingleProcessPrivilege 3824 WMIC.exe Token: SeIncBasePriorityPrivilege 3824 WMIC.exe Token: SeCreatePagefilePrivilege 3824 WMIC.exe Token: SeBackupPrivilege 3824 WMIC.exe Token: SeRestorePrivilege 3824 WMIC.exe Token: SeShutdownPrivilege 3824 WMIC.exe Token: SeDebugPrivilege 3824 WMIC.exe Token: SeSystemEnvironmentPrivilege 3824 WMIC.exe Token: SeRemoteShutdownPrivilege 3824 WMIC.exe Token: SeUndockPrivilege 3824 WMIC.exe Token: SeManageVolumePrivilege 3824 WMIC.exe Token: 33 3824 WMIC.exe Token: 34 3824 WMIC.exe Token: 35 3824 WMIC.exe Token: 36 3824 WMIC.exe Token: SeBackupPrivilege 3296 wbengine.exe Token: SeRestorePrivilege 3296 wbengine.exe Token: SeSecurityPrivilege 3296 wbengine.exe Token: SeDebugPrivilege 1500 WerFault.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeCreatePagefilePrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeCreatePagefilePrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeCreatePagefilePrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeCreatePagefilePrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeCreatePagefilePrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeCreatePagefilePrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
Processes:
explorer.exepid process 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe -
Suspicious use of SendNotifyMessage 27 IoCs
Processes:
explorer.exepid process 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
SearchUI.exeShellExperienceHost.exepid process 3352 SearchUI.exe 3216 ShellExperienceHost.exe 3216 ShellExperienceHost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
svchost.execa02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exedescription pid process target process PID 3528 wrote to memory of 2552 3528 svchost.exe ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe PID 3528 wrote to memory of 2552 3528 svchost.exe ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe PID 3528 wrote to memory of 2552 3528 svchost.exe ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe PID 3528 wrote to memory of 2552 3528 svchost.exe ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe PID 3528 wrote to memory of 2552 3528 svchost.exe ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe PID 3528 wrote to memory of 2552 3528 svchost.exe ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe PID 3528 wrote to memory of 2552 3528 svchost.exe ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe PID 1876 wrote to memory of 3940 1876 ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe cmd.exe PID 1876 wrote to memory of 3940 1876 ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe"C:\Users\Admin\AppData\Local\Temp\ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe"C:\Users\Admin\AppData\Local\Temp\ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe" n18762⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet3⤵
- Deletes backup catalog
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3000 -s 70001⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Enumerates system info in registry
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-2136578390-2771164089-400866267-1000\desktop.iniMD5
57b9f32cb3f93417da5700a62c17bea5
SHA191246e2e7b83bec7f59c703ba7a403829900f385
SHA256ec7c3ad652c5114c9e5a2bcb85a289b179c20fd884f56b7ca13e9825cebd10f6
SHA512fcee2684c242096c70677793af609b49c1d93ced52d130908e4555d0a28b3265db484b5ef4dc3f2df99eeccae8492cee090a1239021a37af18ba8cd575c6beee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\cversions.3.dbMD5
1fc48d0e89b221a8d3fd07de5f7f1838
SHA1dace8bb55162228b308ff1ec3f1ef38c717a2ba5
SHA256c3ac8ad1540bd9facecbbc63fc061dbffefa808f9a796c76cdf0090cae3996ea
SHA51285eeda7e08ec7b84ed54fa353e6b33a7ae831fdcef9d288702661892fbddcb74d915c8bda62af389985b270e29e59a4aec56d2c8cc8046cbd28d56e7034d73a5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000001a.dbMD5
077bdfe0b415d820992429cf3d7d8e8b
SHA1450ca27ace3ebfc5d2bf59c6e4c6a310a1d8c3d1
SHA256b679f371ca333ffcab5e1c520cea98e633873c489e5ee502356c6dc79015883c
SHA51246872997dd92adab0394bf8d7d432aae48a9505c7632ed956afb5a55bcc3e8a04ce27922c5eda3df446398bafd19b1088ac92ca42cf9a94b1882cb6b87b30799
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000001b.dbMD5
1e0ee4120abf321422d72101cee09822
SHA1dd7c9492ca3b694d4d5ce1904d1ed1a1aca48ee9
SHA256ed7a8127be07a79a502512561e0cb05c88077c0d69dfd905fd7f3ed2a453dc3e
SHA512651ebd3214763cc00debdd2474823a8edf6bd312d05ed4db3f443c9b9b32c83f32f87c0416836678495ae7e07a92dbe2abad13d19ce28875833ad30dea8e6fbc
-
C:\Users\Admin\AppData\Local\Temp\WERD94.tmp.appcompat.txtMD5
676dbb7a4cbf907a67d683d288ec6507
SHA1ebdba48b4befad45b90d29550aefcae8ede7e216
SHA25615bd70c69cb2bc5cbe6009e75072481d9d27682f04dd238bd6d7e7364c48bfcb
SHA5125e3af2f3d11db0640d607fe0eae0cb8b9a74ae1965b8f22f76bad6d039654c4fa0bd864fb892a6861863492e7a07e6063c2a35b32ba7700b064b51174e13fda0
-
C:\Users\Admin\AppData\Local\Temp\{8A4D7B43-5FBE-4685-A18A-B92EA106E400}.pngMD5
084c987204fb7e7c5cc375099f6cb2ce
SHA1a685b1489cadb6fbed88398fb73fcce94afcebbb
SHA2569f56c9cafc46099d6f49cf909d850b16db87b39104162c9faac7e8a5766f9a2d
SHA512230d4bbfd15128abb39581990a853ea8b1fde26302f40ab878ad2c9669ee4de491267793640d8bcf145b3a36ae9e81bf31ff66f4f689a327e1ed814732683419
-
C:\Users\All Users\Microsoft\Windows\WER\Temp\WERBBE.tmp.WERInternalMetadata.xmlMD5
5f83050d46d8f96eb03cb1446ead8d2f
SHA1d9dce4272d0d397960e945432964cf651925ca76
SHA2568f678da14a53f58981e097d808bcecc51bb21fe7a13d9f15c7946e1f6b6ea9ba
SHA512b119fe13663999ab196f87d8283fd033391e5d72bfdf439f25fc5c32eb63f869d86f6de8d3942b9c6c081838bb59b53268cb20b0bd2a6b52bc7d869233e4e34d
-
memory/1500-147-0x0000017562140000-0x0000017562141000-memory.dmpFilesize
4KB
-
memory/1500-0-0x0000017560630000-0x0000017560631000-memory.dmpFilesize
4KB
-
memory/1500-12-0x0000017562200000-0x0000017562201000-memory.dmpFilesize
4KB
-
memory/1500-4-0x0000017561BA0000-0x0000017561BA1000-memory.dmpFilesize
4KB
-
memory/1500-157-0x0000017562140000-0x0000017562141000-memory.dmpFilesize
4KB
-
memory/1500-181-0x0000017562140000-0x0000017562141000-memory.dmpFilesize
4KB
-
memory/1500-199-0x0000017562140000-0x0000017562141000-memory.dmpFilesize
4KB
-
memory/1500-261-0x000001756C170000-0x000001756C171000-memory.dmpFilesize
4KB
-
memory/1500-3-0x0000017561BA0000-0x0000017561BA1000-memory.dmpFilesize
4KB
-
memory/1500-1-0x0000017560630000-0x0000017560631000-memory.dmpFilesize
4KB