Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
02-10-2020 18:04
Static task
static1
Behavioral task
behavioral1
Sample
ky.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
ky.bin.exe
Resource
win10v200722
General
-
Target
ky.bin.exe
-
Size
421KB
-
MD5
80143152971ee77d14bb77c8d10346ec
-
SHA1
6c6e9ebe1e11714bd4c3584fc5b732ccfb782a05
-
SHA256
7860832a25f403c43865c00bd072fa58b2da66bc81152eec30582ad0a72932e6
-
SHA512
133f5a81542f5475597b5d2dea84af932ff49df5286a27dc9ce0dfdaa200d52f6cec8fd9f44c07e86e2585195c278874953e4dcd15a5b1a7845f704125e0c36b
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1400429095-533421673-2598934218-1000\SYMMYWARE.TXT
simmyware@protonmail.ch
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
PsExec.exehyBrDFjOidLuty.exepid process 3968 PsExec.exe 1716 hyBrDFjOidLuty.exe -
Modifies Installed Components in the registry 2 TTPs
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
hyBrDFjOidLuty.exedescription ioc process File renamed C:\Users\Admin\Pictures\DisconnectFormat.raw => C:\Users\Admin\Pictures\DisconnectFormat.raw.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\MeasureDebug.raw => C:\Users\Admin\Pictures\MeasureDebug.raw.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\ShowFormat.crw => C:\Users\Admin\Pictures\ShowFormat.crw.SYMMYWARE hyBrDFjOidLuty.exe File renamed C:\Users\Admin\Pictures\UnlockResolve.raw => C:\Users\Admin\Pictures\UnlockResolve.raw.SYMMYWARE hyBrDFjOidLuty.exe -
Drops startup file 1 IoCs
Processes:
hyBrDFjOidLuty.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\SYMMYWARE.TXT hyBrDFjOidLuty.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
ky.bin.exepid process 3288 ky.bin.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SearchUI.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchUI.exe -
Modifies Control Panel 5 IoCs
Processes:
explorer.exeShellExperienceHost.exeSearchUI.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\Desktop\LastUpdated = "4294967295" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\Colors ShellExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\Colors SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\Desktop explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\Desktop\TranscodedImageCount = "1" explorer.exe -
Modifies registry class 30 IoCs
Processes:
SearchUI.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana SearchUI.exe Set value (data) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "132398939778499984" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance explorer.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "23" SearchUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.cortana SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.cortana\ = "56" SearchUI.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "23" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.cortana\Total = "56" SearchUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.cortana_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchUI.exe -
Suspicious behavior: EnumeratesProcesses 77 IoCs
Processes:
ky.bin.exehyBrDFjOidLuty.exepid process 3288 ky.bin.exe 3288 ky.bin.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe 1716 hyBrDFjOidLuty.exe -
Suspicious use of AdjustPrivilegeToken 65 IoCs
Processes:
hyBrDFjOidLuty.exeexplorer.exedescription pid process Token: SeDebugPrivilege 1716 hyBrDFjOidLuty.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe Token: SeCreatePagefilePrivilege 492 explorer.exe Token: SeShutdownPrivilege 492 explorer.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
Processes:
explorer.exepid process 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
explorer.exepid process 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe 492 explorer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
ShellExperienceHost.exeSearchUI.exepid process 1948 ShellExperienceHost.exe 3672 SearchUI.exe 1948 ShellExperienceHost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ky.bin.execmd.exePsExec.exehyBrDFjOidLuty.exedescription pid process target process PID 3288 wrote to memory of 3656 3288 ky.bin.exe cmd.exe PID 3288 wrote to memory of 3656 3288 ky.bin.exe cmd.exe PID 3656 wrote to memory of 3968 3656 cmd.exe PsExec.exe PID 3656 wrote to memory of 3968 3656 cmd.exe PsExec.exe PID 3656 wrote to memory of 3968 3656 cmd.exe PsExec.exe PID 3968 wrote to memory of 1716 3968 PsExec.exe hyBrDFjOidLuty.exe PID 3968 wrote to memory of 1716 3968 PsExec.exe hyBrDFjOidLuty.exe PID 1716 wrote to memory of 492 1716 hyBrDFjOidLuty.exe explorer.exe PID 1716 wrote to memory of 492 1716 hyBrDFjOidLuty.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ky.bin.exe"C:\Users\Admin\AppData\Local\Temp\ky.bin.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D353.tmp\D354.bat C:\Users\Admin\AppData\Local\Temp\ky.bin.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PsExec.exepsexec hyBrDFjOidLuty.exe /accepteula -s -high3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\hyBrDFjOidLuty.exe"hyBrDFjOidLuty.exe" /accepteula -s -high4⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"5⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
- Enumerates system info in registry
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\D353.tmp\D354.batMD5
ed53b8acfbea918e8c95e7a39c286d83
SHA119dc601925d5602cb135b9012da4032947b533ac
SHA25646c77d27fab56e047a51a472e9cdd1371e510d7a878bbb693d53dfee37130472
SHA512e2f1bf41ac80f66a45cdc076325f23cb88628c1bc27a166e7f4cd82df357d6abbbe68a42c946b0754ef859aef1a3f4e227d2d2108e20140e3b9e67cd1a88dc73
-
C:\Users\Admin\AppData\Local\Temp\PsExec.exeMD5
27304b246c7d5b4e149124d5f93c5b01
SHA1e50d9e3bd91908e13a26b3e23edeaf577fb3a095
SHA2563337e3875b05e0bfba69ab926532e3f179e8cfbf162ebb60ce58a0281437a7ef
SHA512bec172a2f92a95796199cfc83f544a78685b52a94061ce0ffb46b265070ee0bcc018c4f548f56018bf3ff1e74952811b2afb6df79ab8d09f1ec73c9477af636b
-
C:\Users\Admin\AppData\Local\Temp\PsExec.exeMD5
27304b246c7d5b4e149124d5f93c5b01
SHA1e50d9e3bd91908e13a26b3e23edeaf577fb3a095
SHA2563337e3875b05e0bfba69ab926532e3f179e8cfbf162ebb60ce58a0281437a7ef
SHA512bec172a2f92a95796199cfc83f544a78685b52a94061ce0ffb46b265070ee0bcc018c4f548f56018bf3ff1e74952811b2afb6df79ab8d09f1ec73c9477af636b
-
C:\Users\Admin\AppData\Local\Temp\hyBrDFjOidLuty.exeMD5
9ca339da8a96656779074b5caaa76c63
SHA1f6813078253f72bf25c136debe45ac54cfbb7012
SHA256da50730580bd7fe14fca5c3547eb54882b6f79b42cd474530b9b07dd5de4f1ac
SHA5122971f3cbfd65340f33381346fb60e6425282316077b28dd22cd5abc0c5854842cf8dd2936e818204dfa7d3a53ef8b2e924cd1183ae5234513f39b43eb096912d
-
C:\Users\Admin\AppData\Local\Temp\hyBrDFjOidLuty.exeMD5
9ca339da8a96656779074b5caaa76c63
SHA1f6813078253f72bf25c136debe45ac54cfbb7012
SHA256da50730580bd7fe14fca5c3547eb54882b6f79b42cd474530b9b07dd5de4f1ac
SHA5122971f3cbfd65340f33381346fb60e6425282316077b28dd22cd5abc0c5854842cf8dd2936e818204dfa7d3a53ef8b2e924cd1183ae5234513f39b43eb096912d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\File Explorer.lnk.SYMMYWAREMD5
1da5d0b4d7ac5acf4b1749915bc83d91
SHA12e1725c5b1240d44cec7951463049734f6f1f9ad
SHA256a06aa30795875ec12df0ee2f4dfb1b70bddec6fa6569d7dee7eaf685cddbdaad
SHA512409d5161354b622e026b5d1973b69ed42c3cf086f582f625d985e21ac25173622520201490e35a53779befd96a39e21d307a36cd4263471a3222cff39173e9ec
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk.SYMMYWAREMD5
77c9348d94dfbefc592558effa1e41a9
SHA1281b1288a4c352a53ac229408bc21beeb786562f
SHA25613939449e79f91153c3dc5815040b22a5dabfb274a92ff63483b39042de7d20f
SHA512483855c60239894f82b82f34268d2d8d2691fb507fc361ed6ba68eb4beaca93f48462f00f971a9a953e3d9da18781b35859d13f24f07e0c0a4351e4ae0938159
-
memory/492-12-0x0000000000000000-mapping.dmp
-
memory/1716-9-0x00007FF96C600000-0x00007FF96CFEC000-memory.dmpFilesize
9.9MB
-
memory/1716-10-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1716-6-0x0000000000000000-mapping.dmp
-
memory/3288-0-0x0000000000640000-0x0000000000642000-memory.dmpFilesize
8KB
-
memory/3656-1-0x0000000000000000-mapping.dmp
-
memory/3968-3-0x0000000000000000-mapping.dmp