Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12/11/2020, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe
Resource
win10v20201028
General
-
Target
3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe
-
Size
173KB
-
MD5
8cf406f0f89d84050ddc3f5acc013e4e
-
SHA1
060e505e4283811d629b406cf137432237239bc3
-
SHA256
3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2
-
SHA512
7318ab05ec213695e08b9edeb7948f5430ea3509146781edbf41c857d098194185be655dcb2e93a4fc8c9979b41192236200286f8e016a6828bfe5839a8489f0
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
http://cerberhhyed5frqa.onion.to/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.onion.cab/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.onion.nu/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.onion.link/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.tor2web.org/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.onion.to/27FF-F720-3B6E-0000-0BEF);
http://cerberhhyed5frqa.onion/27FF-F720-3B6E-0000-0BEF
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.onion.to/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.onion.cab/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.onion.nu/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.onion.link/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.tor2web.org/27FF-F720-3B6E-0000-0BEF
http://cerberhhyed5frqa.onion.to/27FF-F720-3B6E-0000-0BEF);
http://cerberhhyed5frqa.onion/27FF-F720-3B6E-0000-0BEF
Signatures
-
Ursnif RM3
A heavily modified version of Ursnif discovered in the wild.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\hh.exe\"" 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\hh.exe\"" hh.exe -
Executes dropped EXE 3 IoCs
pid Process 1304 hh.exe 1444 hh.exe 2312 hh.exe -
Deletes itself 1 IoCs
pid Process 1528 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\hh.lnk 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\hh.lnk hh.exe -
Loads dropped DLL 2 IoCs
pid Process 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe 1304 hh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hh = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\hh.exe\"" 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run hh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\hh = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\hh.exe\"" hh.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce hh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\hh = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\hh.exe\"" hh.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\hh = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\hh.exe\"" 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hh.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io -
Modifies service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1444 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 360 taskkill.exe 2400 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop hh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\hh.exe\"" hh.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\hh.exe\"" 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAA4B771-2500-11EB-8030-C611B4A1F110} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "311962118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a600000000002000000000010660000000100002000000087e78eb01aca671445b5fad93eddeb143a56d4e0cb77d63a32d670d3dd5fdbbf000000000e8000000002000020000000f0ad135bcc21595d6baecda7e5324559444000c2c1190ac21fa25dc61ec714ad20000000d81f51a7a7164055a00f9f31c552f68086ab8a0aefd250d73f5e9deac7d3a2c8400000008217928df5739969b122c98c29b17b778ef542aa7a010c820c630707927e84756eced092ed93139e31fe40f6acc720df84f0ddd82144062e4a792c60300fcdf0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA79DEB1-2500-11EB-8030-C611B4A1F110} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805c16af0db9d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1348 PING.EXE 2480 PING.EXE -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe 1304 hh.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeDebugPrivilege 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe Token: SeDebugPrivilege 1304 hh.exe Token: SeBackupPrivilege 1480 vssvc.exe Token: SeRestorePrivilege 1480 vssvc.exe Token: SeAuditPrivilege 1480 vssvc.exe Token: SeDebugPrivilege 360 taskkill.exe Token: SeIncreaseQuotaPrivilege 592 wmic.exe Token: SeSecurityPrivilege 592 wmic.exe Token: SeTakeOwnershipPrivilege 592 wmic.exe Token: SeLoadDriverPrivilege 592 wmic.exe Token: SeSystemProfilePrivilege 592 wmic.exe Token: SeSystemtimePrivilege 592 wmic.exe Token: SeProfSingleProcessPrivilege 592 wmic.exe Token: SeIncBasePriorityPrivilege 592 wmic.exe Token: SeCreatePagefilePrivilege 592 wmic.exe Token: SeBackupPrivilege 592 wmic.exe Token: SeRestorePrivilege 592 wmic.exe Token: SeShutdownPrivilege 592 wmic.exe Token: SeDebugPrivilege 592 wmic.exe Token: SeSystemEnvironmentPrivilege 592 wmic.exe Token: SeRemoteShutdownPrivilege 592 wmic.exe Token: SeUndockPrivilege 592 wmic.exe Token: SeManageVolumePrivilege 592 wmic.exe Token: 33 592 wmic.exe Token: 34 592 wmic.exe Token: 35 592 wmic.exe Token: SeIncreaseQuotaPrivilege 592 wmic.exe Token: SeSecurityPrivilege 592 wmic.exe Token: SeTakeOwnershipPrivilege 592 wmic.exe Token: SeLoadDriverPrivilege 592 wmic.exe Token: SeSystemProfilePrivilege 592 wmic.exe Token: SeSystemtimePrivilege 592 wmic.exe Token: SeProfSingleProcessPrivilege 592 wmic.exe Token: SeIncBasePriorityPrivilege 592 wmic.exe Token: SeCreatePagefilePrivilege 592 wmic.exe Token: SeBackupPrivilege 592 wmic.exe Token: SeRestorePrivilege 592 wmic.exe Token: SeShutdownPrivilege 592 wmic.exe Token: SeDebugPrivilege 592 wmic.exe Token: SeSystemEnvironmentPrivilege 592 wmic.exe Token: SeRemoteShutdownPrivilege 592 wmic.exe Token: SeUndockPrivilege 592 wmic.exe Token: SeManageVolumePrivilege 592 wmic.exe Token: 33 592 wmic.exe Token: 34 592 wmic.exe Token: 35 592 wmic.exe Token: SeDebugPrivilege 1444 hh.exe Token: 33 592 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 592 AUDIODG.EXE Token: 33 592 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 592 AUDIODG.EXE Token: SeDebugPrivilege 2312 hh.exe Token: SeDebugPrivilege 2400 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 608 iexplore.exe 1084 iexplore.exe 608 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 608 iexplore.exe 608 iexplore.exe 1084 iexplore.exe 1084 iexplore.exe 608 iexplore.exe 608 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 560 IEXPLORE.EXE 560 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1304 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe 29 PID 1704 wrote to memory of 1304 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe 29 PID 1704 wrote to memory of 1304 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe 29 PID 1704 wrote to memory of 1304 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe 29 PID 1704 wrote to memory of 1528 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe 30 PID 1704 wrote to memory of 1528 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe 30 PID 1704 wrote to memory of 1528 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe 30 PID 1704 wrote to memory of 1528 1704 3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe 30 PID 1304 wrote to memory of 1444 1304 hh.exe 31 PID 1304 wrote to memory of 1444 1304 hh.exe 31 PID 1304 wrote to memory of 1444 1304 hh.exe 31 PID 1304 wrote to memory of 1444 1304 hh.exe 31 PID 1528 wrote to memory of 360 1528 cmd.exe 34 PID 1528 wrote to memory of 360 1528 cmd.exe 34 PID 1528 wrote to memory of 360 1528 cmd.exe 34 PID 1528 wrote to memory of 360 1528 cmd.exe 34 PID 1304 wrote to memory of 592 1304 hh.exe 36 PID 1304 wrote to memory of 592 1304 hh.exe 36 PID 1304 wrote to memory of 592 1304 hh.exe 36 PID 1304 wrote to memory of 592 1304 hh.exe 36 PID 1528 wrote to memory of 1348 1528 cmd.exe 39 PID 1528 wrote to memory of 1348 1528 cmd.exe 39 PID 1528 wrote to memory of 1348 1528 cmd.exe 39 PID 1528 wrote to memory of 1348 1528 cmd.exe 39 PID 368 wrote to memory of 1444 368 taskeng.exe 44 PID 368 wrote to memory of 1444 368 taskeng.exe 44 PID 368 wrote to memory of 1444 368 taskeng.exe 44 PID 368 wrote to memory of 1444 368 taskeng.exe 44 PID 1304 wrote to memory of 608 1304 hh.exe 45 PID 1304 wrote to memory of 608 1304 hh.exe 45 PID 1304 wrote to memory of 608 1304 hh.exe 45 PID 1304 wrote to memory of 608 1304 hh.exe 45 PID 1304 wrote to memory of 1528 1304 hh.exe 46 PID 1304 wrote to memory of 1528 1304 hh.exe 46 PID 1304 wrote to memory of 1528 1304 hh.exe 46 PID 1304 wrote to memory of 1528 1304 hh.exe 46 PID 608 wrote to memory of 1740 608 iexplore.exe 48 PID 608 wrote to memory of 1740 608 iexplore.exe 48 PID 608 wrote to memory of 1740 608 iexplore.exe 48 PID 608 wrote to memory of 1740 608 iexplore.exe 48 PID 1084 wrote to memory of 560 1084 iexplore.exe 49 PID 1084 wrote to memory of 560 1084 iexplore.exe 49 PID 1084 wrote to memory of 560 1084 iexplore.exe 49 PID 1084 wrote to memory of 560 1084 iexplore.exe 49 PID 1304 wrote to memory of 1248 1304 hh.exe 50 PID 1304 wrote to memory of 1248 1304 hh.exe 50 PID 1304 wrote to memory of 1248 1304 hh.exe 50 PID 1304 wrote to memory of 1248 1304 hh.exe 50 PID 368 wrote to memory of 2312 368 taskeng.exe 54 PID 368 wrote to memory of 2312 368 taskeng.exe 54 PID 368 wrote to memory of 2312 368 taskeng.exe 54 PID 368 wrote to memory of 2312 368 taskeng.exe 54 PID 1304 wrote to memory of 2368 1304 hh.exe 55 PID 1304 wrote to memory of 2368 1304 hh.exe 55 PID 1304 wrote to memory of 2368 1304 hh.exe 55 PID 1304 wrote to memory of 2368 1304 hh.exe 55 PID 2368 wrote to memory of 2400 2368 cmd.exe 57 PID 2368 wrote to memory of 2400 2368 cmd.exe 57 PID 2368 wrote to memory of 2400 2368 cmd.exe 57 PID 2368 wrote to memory of 2400 2368 cmd.exe 57 PID 2368 wrote to memory of 2480 2368 cmd.exe 59 PID 2368 wrote to memory of 2480 2368 cmd.exe 59 PID 2368 wrote to memory of 2480 2368 cmd.exe 59 PID 2368 wrote to memory of 2480 2368 cmd.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe"C:\Users\Admin\AppData\Local\Temp\3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\hh.exe"C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\hh.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1444
-
-
C:\Windows\SysWOW64\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:608 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1528
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1248
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "hh.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\hh.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "hh.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2480
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "3a7e74f0ecf5c9b44add16fceb394def8a7789334906a710e476e7f361cd38c2.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:360
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1348
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
C:\Windows\system32\taskeng.exetaskeng.exe {DC1FF4A6-D219-4D5B-A137-D569AADC8F24} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\hh.exeC:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\hh.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\hh.exeC:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\hh.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:560
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:956
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5781⤵
- Suspicious use of AdjustPrivilegeToken
PID:592