Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13/11/2020, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe
Resource
win10v20201028
General
-
Target
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe
-
Size
270KB
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
-
SHA1
a9bf1c6f3f08203cf10fdaf141012dc83646aee1
-
SHA256
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
-
SHA512
ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
Malware Config
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.cab/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.nu/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.link/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.tor2web.org/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion/DA18-B58F-AE58-0072-8277
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/DA18-B58F-AE58-0072-8277(Get
http://bqyjebfh25oellur.onion.cab/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.nu/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.link/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.tor2web.org/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion.to/DA18-B58F-AE58-0072-8277);
http://bqyjebfh25oellur.onion.to/DA18-B58F-AE58-0072-8277
http://bqyjebfh25oellur.onion/DA18-B58F-AE58-0072-8277
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Ursnif RM3
A heavily modified version of Ursnif discovered in the wild.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" systeminfo.exe -
Executes dropped EXE 2 IoCs
pid Process 1976 systeminfo.exe 1064 systeminfo.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\DebugRead.tiff systeminfo.exe File opened for modification C:\Users\Admin\Pictures\StepUninstall.tiff systeminfo.exe -
Deletes itself 1 IoCs
pid Process 1948 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\systeminfo.lnk 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\systeminfo.lnk systeminfo.exe -
Loads dropped DLL 2 IoCs
pid Process 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 1976 systeminfo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run systeminfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" systeminfo.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce systeminfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" systeminfo.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\systeminfo = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA systeminfo.exe -
JavaScript code in executable 1 IoCs
resource yara_rule behavioral1/files/0x00030000000131e6-20.dat js -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp4F.bmp" systeminfo.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.html systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.html systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.url systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.url systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote.ini systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.txt systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.txt systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE systeminfo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.vbs systeminfo.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.vbs systeminfo.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 1064 systeminfo.exe 1976 systeminfo.exe -
Kills process with taskkill 2 IoCs
pid Process 1732 taskkill.exe 2292 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop systeminfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\systeminfo.exe\"" systeminfo.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000fd8d552ca6c9bc500c957cc65c8c6a1b3c67aebb7612d600b2f63cb9fe57aad4000000000e80000000020000200000005bce2b217b187349212b3c39bbf43180b055269a40002ed731b69581015c9ab4900000001a79f49ecc696a49fc1af5d1e4c5c44458035719b47eeb7010c4e670fb9ec553e9b435bd4392a81235969796bba3f95c07af56a3ea313b6ccc420d58c30d7cdfc12709bb29859bcf69b1999573f8a7e9ccec4ee347c1a6d363584cfeef820334999a2d866cbfcff59bd801bf08729057ab01d4d7dfae3aff84dfc539094f9ca4badff1d022a32c01c9e315cfb458af7040000000c7cedaf4c107f5fee9ccff0e5147ce50ba889549327f4cbca8ec63fb7f49ae33f63a8188e9d230003c684addd83889a98f2b53c6aca7c38c0746018fa388f392 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "312063679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e8b226fab9d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62050D51-25ED-11EB-AA42-6A86915434CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000c0cd81287aa1067faa50591ee0406ce308c2564a959c46c9c7e7c9ea0847b1ca000000000e80000000020000200000007e54b5ab7653307feb4c6f6f99c82cc8ef7ca1829b1c558f5a5603eaf8e4d10520000000fb544ee439160fcefd13d45dac0d7952fa63506ec9f1a496dbcac29762f590a04000000020cd84c0b8ee7fa478d36d89b1bb05fe1610a51ea6445da21c3e8a1f5d0cb2062719098a7126e06acb3904c2f23e86ee7c25a3d8e89d5bd8b547463862d9bb24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62370A31-25ED-11EB-AA42-6A86915434CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1360 PING.EXE 2348 PING.EXE -
Suspicious behavior: EnumeratesProcesses 240 IoCs
pid Process 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe 1976 systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Token: SeDebugPrivilege 1732 taskkill.exe Token: SeDebugPrivilege 1976 systeminfo.exe Token: SeDebugPrivilege 1064 systeminfo.exe Token: 33 2140 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2140 AUDIODG.EXE Token: 33 2140 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2140 AUDIODG.EXE Token: SeDebugPrivilege 2292 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 644 iexplore.exe 1144 iexplore.exe 1144 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1144 iexplore.exe 1144 iexplore.exe 644 iexplore.exe 644 iexplore.exe 1144 iexplore.exe 1144 iexplore.exe 344 IEXPLORE.EXE 344 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 1976 systeminfo.exe 1064 systeminfo.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1084 wrote to memory of 1976 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 27 PID 1084 wrote to memory of 1976 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 27 PID 1084 wrote to memory of 1976 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 27 PID 1084 wrote to memory of 1976 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 27 PID 1084 wrote to memory of 1948 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 28 PID 1084 wrote to memory of 1948 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 28 PID 1084 wrote to memory of 1948 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 28 PID 1084 wrote to memory of 1948 1084 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe 28 PID 1948 wrote to memory of 1732 1948 cmd.exe 30 PID 1948 wrote to memory of 1732 1948 cmd.exe 30 PID 1948 wrote to memory of 1732 1948 cmd.exe 30 PID 1948 wrote to memory of 1732 1948 cmd.exe 30 PID 1948 wrote to memory of 1360 1948 cmd.exe 32 PID 1948 wrote to memory of 1360 1948 cmd.exe 32 PID 1948 wrote to memory of 1360 1948 cmd.exe 32 PID 1948 wrote to memory of 1360 1948 cmd.exe 32 PID 1248 wrote to memory of 1064 1248 taskeng.exe 38 PID 1248 wrote to memory of 1064 1248 taskeng.exe 38 PID 1248 wrote to memory of 1064 1248 taskeng.exe 38 PID 1248 wrote to memory of 1064 1248 taskeng.exe 38 PID 1976 wrote to memory of 1144 1976 systeminfo.exe 40 PID 1976 wrote to memory of 1144 1976 systeminfo.exe 40 PID 1976 wrote to memory of 1144 1976 systeminfo.exe 40 PID 1976 wrote to memory of 1144 1976 systeminfo.exe 40 PID 1976 wrote to memory of 1840 1976 systeminfo.exe 41 PID 1976 wrote to memory of 1840 1976 systeminfo.exe 41 PID 1976 wrote to memory of 1840 1976 systeminfo.exe 41 PID 1976 wrote to memory of 1840 1976 systeminfo.exe 41 PID 1144 wrote to memory of 344 1144 iexplore.exe 42 PID 1144 wrote to memory of 344 1144 iexplore.exe 42 PID 1144 wrote to memory of 344 1144 iexplore.exe 42 PID 1144 wrote to memory of 344 1144 iexplore.exe 42 PID 644 wrote to memory of 768 644 iexplore.exe 44 PID 644 wrote to memory of 768 644 iexplore.exe 44 PID 644 wrote to memory of 768 644 iexplore.exe 44 PID 644 wrote to memory of 768 644 iexplore.exe 44 PID 1144 wrote to memory of 1344 1144 iexplore.exe 45 PID 1144 wrote to memory of 1344 1144 iexplore.exe 45 PID 1144 wrote to memory of 1344 1144 iexplore.exe 45 PID 1144 wrote to memory of 1344 1144 iexplore.exe 45 PID 1976 wrote to memory of 1808 1976 systeminfo.exe 46 PID 1976 wrote to memory of 1808 1976 systeminfo.exe 46 PID 1976 wrote to memory of 1808 1976 systeminfo.exe 46 PID 1976 wrote to memory of 1808 1976 systeminfo.exe 46 PID 1976 wrote to memory of 2236 1976 systeminfo.exe 49 PID 1976 wrote to memory of 2236 1976 systeminfo.exe 49 PID 1976 wrote to memory of 2236 1976 systeminfo.exe 49 PID 1976 wrote to memory of 2236 1976 systeminfo.exe 49 PID 2236 wrote to memory of 2292 2236 cmd.exe 51 PID 2236 wrote to memory of 2292 2236 cmd.exe 51 PID 2236 wrote to memory of 2292 2236 cmd.exe 51 PID 2236 wrote to memory of 2348 2236 cmd.exe 52 PID 2236 wrote to memory of 2348 2236 cmd.exe 52 PID 2236 wrote to memory of 2348 2236 cmd.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe"C:\Users\Admin\AppData\Local\Temp\9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exe"C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Gathers system information
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1144 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:344
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1144 CREDAT:406530 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1344
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1840
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1808
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "systeminfo.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "systeminfo.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2348
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1360
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {73611AA5-DC7C-4DFE-8844-B3511293F755} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exeC:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\systeminfo.exe2⤵
- Executes dropped EXE
- Gathers system information
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1064
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:768
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:2092
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5bc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2140