Resubmissions
17-01-2021 17:20
210117-42l4186m4a 1017-01-2021 17:16
210117-436yb29wwa 1011-01-2021 07:41
210111-s6ytr1ebc2 10Analysis
-
max time kernel
152s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-01-2021 17:20
Static task
static1
Behavioral task
behavioral1
Sample
6275a839b5071bf445539c8652d2b13b.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
6275a839b5071bf445539c8652d2b13b.exe
Resource
win10v20201028
General
-
Target
6275a839b5071bf445539c8652d2b13b.exe
-
Size
1.0MB
-
MD5
6275a839b5071bf445539c8652d2b13b
-
SHA1
1e0946ea29e3eca33384ccab5a627d778a6e612d
-
SHA256
f0aec57001a184ea82122a59c6e5be48042f75d6f11a40125995ba9531aab718
-
SHA512
f31006c16dc31548283a4434ee4e13e878a24d10c1963d6b81083862a8cd544004612886e77774e3072481fee0411665d6db6ca8d5e25b9e8e72e7252603d677
Malware Config
Signatures
-
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 1216 bcdedit.exe 1548 bcdedit.exe -
Processes:
wbadmin.exepid process 928 wbadmin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6275a839b5071bf445539c8652d2b13b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ldfwV = "C:\\Users\\Admin\\ldfwV.url" 6275a839b5071bf445539c8652d2b13b.exe -
Drops desktop.ini file(s) 6 IoCs
Processes:
ieinstal.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini ieinstal.exe File opened for modification C:\Program Files (x86)\desktop.ini ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI ieinstal.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3825035466-2522850611-591511364-1000\desktop.ini ieinstal.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini ieinstal.exe File opened for modification C:\Program Files\desktop.ini ieinstal.exe -
Drops file in Program Files directory 15528 IoCs
Processes:
ieinstal.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00405_.WMF ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18251_.WMF.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\eclipse.inf.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\ECLIPSE.INF ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01149_.WMF ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02400_.WMF.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18227_.WMF.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\GroupSelect.MTS ieinstal.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\cacerts.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HM00005_.WMF ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR33F.GIF.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\Hobart.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Amsterdam.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe ieinstal.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Workflow.VisualBasic.Targets.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\LAYERS.ELM ieinstal.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\liberase_plugin.dll.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\23.png ieinstal.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeXMP.dll ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00221_.WMF.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\Document.gif.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Detroit.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-outline.xml ieinstal.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\tipresx.dll.mui ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152556.WMF ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN02122_.WMF ieinstal.exe File opened for modification C:\Program Files\Java\jre7\bin\JAWTAccessBridge-64.dll ieinstal.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\ZX______.PFB.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SAFRI_01.MID.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00234_.WMF ieinstal.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviewers.gif.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG_PAL.wmv ieinstal.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.ja_5.5.0.165303.jar.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\MSTAG.TLB ieinstal.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_ButtonGraphic.png ieinstal.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\libtimecode_plugin.dll.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18233_.WMF ieinstal.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\com.jrockit.mc.rcp.product_root_5.5.0.165303.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libantiflicker_plugin.dll.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02040U.BMP.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-ui_zh_CN.jar ieinstal.exe File created C:\Program Files\Java\jre7\lib\deploy\messages.properties.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME-JAVAFX.txt.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\FONTSCHM.INI.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\vlc.mo ieinstal.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository_1.2.100.v20131209-2144.jar ieinstal.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\vlc.mo.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bNext.png ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241037.WMF ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Invite or Link.one ieinstal.exe File created C:\Program Files\7-Zip\Lang\lt.txt.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jre7\lib\fonts\LucidaBrightDemiBold.ttf.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115843.GIF ieinstal.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Rothera ieinstal.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe ieinstal.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Extensions.Design.dll ieinstal.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FLAP.WMF ieinstal.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT.DEV_K_COL.HXK.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.beans.nl_ja_4.4.0.v20140623020002.jar.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Phoenix ieinstal.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jawt.dll.id[D3426269-2275].[helprecover@foxmail.com].help ieinstal.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1504 vssadmin.exe -
Processes:
6275a839b5071bf445539c8652d2b13b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 6275a839b5071bf445539c8652d2b13b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 6275a839b5071bf445539c8652d2b13b.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 14 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 261 IoCs
Processes:
taskmgr.exeieinstal.exepid process 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 1104 taskmgr.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 1104 taskmgr.exe 848 ieinstal.exe 848 ieinstal.exe 1104 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1104 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
taskmgr.exeieinstal.exevssvc.exeWMIC.exewbengine.exedescription pid process Token: SeDebugPrivilege 1104 taskmgr.exe Token: SeDebugPrivilege 848 ieinstal.exe Token: SeBackupPrivilege 1656 vssvc.exe Token: SeRestorePrivilege 1656 vssvc.exe Token: SeAuditPrivilege 1656 vssvc.exe Token: SeIncreaseQuotaPrivilege 268 WMIC.exe Token: SeSecurityPrivilege 268 WMIC.exe Token: SeTakeOwnershipPrivilege 268 WMIC.exe Token: SeLoadDriverPrivilege 268 WMIC.exe Token: SeSystemProfilePrivilege 268 WMIC.exe Token: SeSystemtimePrivilege 268 WMIC.exe Token: SeProfSingleProcessPrivilege 268 WMIC.exe Token: SeIncBasePriorityPrivilege 268 WMIC.exe Token: SeCreatePagefilePrivilege 268 WMIC.exe Token: SeBackupPrivilege 268 WMIC.exe Token: SeRestorePrivilege 268 WMIC.exe Token: SeShutdownPrivilege 268 WMIC.exe Token: SeDebugPrivilege 268 WMIC.exe Token: SeSystemEnvironmentPrivilege 268 WMIC.exe Token: SeRemoteShutdownPrivilege 268 WMIC.exe Token: SeUndockPrivilege 268 WMIC.exe Token: SeManageVolumePrivilege 268 WMIC.exe Token: 33 268 WMIC.exe Token: 34 268 WMIC.exe Token: 35 268 WMIC.exe Token: SeIncreaseQuotaPrivilege 268 WMIC.exe Token: SeSecurityPrivilege 268 WMIC.exe Token: SeTakeOwnershipPrivilege 268 WMIC.exe Token: SeLoadDriverPrivilege 268 WMIC.exe Token: SeSystemProfilePrivilege 268 WMIC.exe Token: SeSystemtimePrivilege 268 WMIC.exe Token: SeProfSingleProcessPrivilege 268 WMIC.exe Token: SeIncBasePriorityPrivilege 268 WMIC.exe Token: SeCreatePagefilePrivilege 268 WMIC.exe Token: SeBackupPrivilege 268 WMIC.exe Token: SeRestorePrivilege 268 WMIC.exe Token: SeShutdownPrivilege 268 WMIC.exe Token: SeDebugPrivilege 268 WMIC.exe Token: SeSystemEnvironmentPrivilege 268 WMIC.exe Token: SeRemoteShutdownPrivilege 268 WMIC.exe Token: SeUndockPrivilege 268 WMIC.exe Token: SeManageVolumePrivilege 268 WMIC.exe Token: 33 268 WMIC.exe Token: 34 268 WMIC.exe Token: 35 268 WMIC.exe Token: SeBackupPrivilege 1348 wbengine.exe Token: SeRestorePrivilege 1348 wbengine.exe Token: SeSecurityPrivilege 1348 wbengine.exe -
Suspicious use of FindShellTrayWindow 72 IoCs
Processes:
taskmgr.exepid process 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe -
Suspicious use of SendNotifyMessage 72 IoCs
Processes:
taskmgr.exepid process 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
6275a839b5071bf445539c8652d2b13b.exeieinstal.execmd.exedescription pid process target process PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 804 wrote to memory of 848 804 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 848 wrote to memory of 1636 848 ieinstal.exe cmd.exe PID 848 wrote to memory of 1636 848 ieinstal.exe cmd.exe PID 848 wrote to memory of 1636 848 ieinstal.exe cmd.exe PID 848 wrote to memory of 1636 848 ieinstal.exe cmd.exe PID 1636 wrote to memory of 1504 1636 cmd.exe vssadmin.exe PID 1636 wrote to memory of 1504 1636 cmd.exe vssadmin.exe PID 1636 wrote to memory of 1504 1636 cmd.exe vssadmin.exe PID 1636 wrote to memory of 268 1636 cmd.exe WMIC.exe PID 1636 wrote to memory of 268 1636 cmd.exe WMIC.exe PID 1636 wrote to memory of 268 1636 cmd.exe WMIC.exe PID 1636 wrote to memory of 1216 1636 cmd.exe bcdedit.exe PID 1636 wrote to memory of 1216 1636 cmd.exe bcdedit.exe PID 1636 wrote to memory of 1216 1636 cmd.exe bcdedit.exe PID 1636 wrote to memory of 1548 1636 cmd.exe bcdedit.exe PID 1636 wrote to memory of 1548 1636 cmd.exe bcdedit.exe PID 1636 wrote to memory of 1548 1636 cmd.exe bcdedit.exe PID 1636 wrote to memory of 928 1636 cmd.exe wbadmin.exe PID 1636 wrote to memory of 928 1636 cmd.exe wbadmin.exe PID 1636 wrote to memory of 928 1636 cmd.exe wbadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6275a839b5071bf445539c8652d2b13b.exe"C:\Users\Admin\AppData\Local\Temp\6275a839b5071bf445539c8652d2b13b.exe"1⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-20-0x0000000000000000-mapping.dmp
-
memory/804-2-0x0000000075AE1000-0x0000000075AE3000-memory.dmpFilesize
8KB
-
memory/804-3-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/848-6-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/848-7-0x0000000000000000-mapping.dmp
-
memory/848-8-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/848-10-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/848-18-0x0000000010530000-0x0000000010545000-memory.dmpFilesize
84KB
-
memory/848-19-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/928-23-0x0000000000000000-mapping.dmp
-
memory/1104-4-0x000007FEFBD61000-0x000007FEFBD63000-memory.dmpFilesize
8KB
-
memory/1216-21-0x0000000000000000-mapping.dmp
-
memory/1504-13-0x0000000000000000-mapping.dmp
-
memory/1548-22-0x0000000000000000-mapping.dmp
-
memory/1608-5-0x000007FEF7800000-0x000007FEF7A7A000-memory.dmpFilesize
2.5MB
-
memory/1636-12-0x0000000000000000-mapping.dmp