Resubmissions
17-01-2021 17:20
210117-42l4186m4a 1017-01-2021 17:16
210117-436yb29wwa 1011-01-2021 07:41
210111-s6ytr1ebc2 10Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-01-2021 17:20
Static task
static1
Behavioral task
behavioral1
Sample
6275a839b5071bf445539c8652d2b13b.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
6275a839b5071bf445539c8652d2b13b.exe
Resource
win10v20201028
General
-
Target
6275a839b5071bf445539c8652d2b13b.exe
-
Size
1.0MB
-
MD5
6275a839b5071bf445539c8652d2b13b
-
SHA1
1e0946ea29e3eca33384ccab5a627d778a6e612d
-
SHA256
f0aec57001a184ea82122a59c6e5be48042f75d6f11a40125995ba9531aab718
-
SHA512
f31006c16dc31548283a4434ee4e13e878a24d10c1963d6b81083862a8cd544004612886e77774e3072481fee0411665d6db6ca8d5e25b9e8e72e7252603d677
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 508 created 4044 508 svchost.exe ieinstal.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 3292 bcdedit.exe 1100 bcdedit.exe -
Processes:
wbadmin.exepid process 772 wbadmin.exe -
Drops startup file 1 IoCs
Processes:
ieinstal.exedescription ioc process File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\ieinstal.exe ieinstal.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
6275a839b5071bf445539c8652d2b13b.exeieinstal.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ldfwV = "C:\\Users\\Admin\\ldfwV.url" 6275a839b5071bf445539c8652d2b13b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ieinstal = "C:\\Users\\Admin\\AppData\\Local\\ieinstal.exe" ieinstal.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ieinstal = "C:\\Users\\Admin\\AppData\\Local\\ieinstal.exe" ieinstal.exe -
Drops desktop.ini file(s) 4 IoCs
Processes:
ieinstal.exedescription ioc process File opened for modification C:\Program Files\desktop.ini ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI ieinstal.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3341490333-719741536-2920803124-1000\desktop.ini ieinstal.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini ieinstal.exe -
Drops file in Program Files directory 15251 IoCs
Processes:
ieinstal.exedescription ioc process File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-util-lookup.xml.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ul-oob.xrm-ms.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GADUGI.TTF ieinstal.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\LargeTile.scale-125.png ieinstal.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh.htm.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf.nl_ja_4.4.0.v20140623020002.jar.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libchain_plugin.dll.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red.xml ieinstal.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-ul-oob.xrm-ms.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-utility-l1-1-0.dll ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\adal.dll ieinstal.exe File created C:\Program Files\Java\jre1.8.0_66\bin\WindowsAccessBridge-64.dll.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019DemoR_BypassTrial180-ppd.xrm-ms ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\Office15\pidgenx.dll ieinstal.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN026.XML.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-pl.xrm-ms.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightDemiBold.ttf.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-actions_ja.jar.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\api-ms-win-crt-filesystem-l1-1-0.dll.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ThemeCreation\Effects\effects_lobby_leaves.jpg ieinstal.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2native.dll ieinstal.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423496939244.profile.gz.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libchain_plugin.dll ieinstal.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt ieinstal.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Subscription-ul-oob.xrm-ms.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-ppd.xrm-ms.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_KMS_Client-ppd.xrm-ms.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Tiles\pyramid.jpg ieinstal.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ACEODEXL.DLL.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\VideoLAN\VLC\uninstall.log.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\manifestAssets\contrast-black\Square150x150Logo.scale-100.png ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Autumn\autumn_1c.png ieinstal.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-black_scale-80.png.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libsubsdec_plugin.dll.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\TEE\it-IT.PhoneNumber.SMS.model ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\HowToPlay\Pyramid\Goal_7.jpg ieinstal.exe File created C:\Program Files\7-Zip\Lang\ga.txt.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_zh_CN.jar.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp-ul-oob.xrm-ms ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ul-oob.xrm-ms ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Awards\pyramid\Treasure_Chamber_.png ieinstal.exe File created C:\Program Files\7-Zip\Lang\ku.txt.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2iexp.dll ieinstal.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-32_contrast-black.png ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSPECTRE.DLL.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Resources\TopicPage\core_rtl.css ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_17.8010.5926.0_x64__8wekyb3d8bbwe\images\OfficeIcon.png ieinstal.exe File created C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\bg.pak.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-api-progress.xml.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription3-pl.xrm-ms ieinstal.exe File opened for modification C:\Program Files\Windows Media Player\en-US\wmpnscfg.exe.mui ieinstal.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\MSO99LRES.DLL.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\EmbossBitmaps\Arrow.png ieinstal.exe File created C:\Program Files\Google\Chrome\Application\86.0.4240.111\chrome.exe.sig.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-phn.xrm-ms.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\Microsoft Office\root\Office16\FilterModule.dll.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-30.png ieinstal.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libnoseek_plugin.dll.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libextract_plugin.dll.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Microsoft.Advertising.winmd ieinstal.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\MANIFEST.MF ieinstal.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteFreeR_Bypass-ppd.xrm-ms.id[05FEDAC1-2275].[helprecover@foxmail.com].help ieinstal.exe -
Checks SCSI registry key(s) 3 TTPs 11 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exeSystemSettings.exevds.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID SystemSettings.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID SystemSettings.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 SystemSettings.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exeSystemSettings.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SystemSettings.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SystemSettings.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3936 vssadmin.exe -
Modifies Control Panel 1 IoCs
Processes:
SystemSettings.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\Colors SystemSettings.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 27 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 28 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 560 IoCs
Processes:
ieinstal.exepid process 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe 4044 ieinstal.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
Processes:
svchost.exeieinstal.exevssvc.exeWMIC.exewbengine.exetaskmgr.exeSystemSettings.exedescription pid process Token: SeTcbPrivilege 508 svchost.exe Token: SeTcbPrivilege 508 svchost.exe Token: SeDebugPrivilege 4044 ieinstal.exe Token: SeBackupPrivilege 2824 vssvc.exe Token: SeRestorePrivilege 2824 vssvc.exe Token: SeAuditPrivilege 2824 vssvc.exe Token: SeIncreaseQuotaPrivilege 2340 WMIC.exe Token: SeSecurityPrivilege 2340 WMIC.exe Token: SeTakeOwnershipPrivilege 2340 WMIC.exe Token: SeLoadDriverPrivilege 2340 WMIC.exe Token: SeSystemProfilePrivilege 2340 WMIC.exe Token: SeSystemtimePrivilege 2340 WMIC.exe Token: SeProfSingleProcessPrivilege 2340 WMIC.exe Token: SeIncBasePriorityPrivilege 2340 WMIC.exe Token: SeCreatePagefilePrivilege 2340 WMIC.exe Token: SeBackupPrivilege 2340 WMIC.exe Token: SeRestorePrivilege 2340 WMIC.exe Token: SeShutdownPrivilege 2340 WMIC.exe Token: SeDebugPrivilege 2340 WMIC.exe Token: SeSystemEnvironmentPrivilege 2340 WMIC.exe Token: SeRemoteShutdownPrivilege 2340 WMIC.exe Token: SeUndockPrivilege 2340 WMIC.exe Token: SeManageVolumePrivilege 2340 WMIC.exe Token: 33 2340 WMIC.exe Token: 34 2340 WMIC.exe Token: 35 2340 WMIC.exe Token: 36 2340 WMIC.exe Token: SeIncreaseQuotaPrivilege 2340 WMIC.exe Token: SeSecurityPrivilege 2340 WMIC.exe Token: SeTakeOwnershipPrivilege 2340 WMIC.exe Token: SeLoadDriverPrivilege 2340 WMIC.exe Token: SeSystemProfilePrivilege 2340 WMIC.exe Token: SeSystemtimePrivilege 2340 WMIC.exe Token: SeProfSingleProcessPrivilege 2340 WMIC.exe Token: SeIncBasePriorityPrivilege 2340 WMIC.exe Token: SeCreatePagefilePrivilege 2340 WMIC.exe Token: SeBackupPrivilege 2340 WMIC.exe Token: SeRestorePrivilege 2340 WMIC.exe Token: SeShutdownPrivilege 2340 WMIC.exe Token: SeDebugPrivilege 2340 WMIC.exe Token: SeSystemEnvironmentPrivilege 2340 WMIC.exe Token: SeRemoteShutdownPrivilege 2340 WMIC.exe Token: SeUndockPrivilege 2340 WMIC.exe Token: SeManageVolumePrivilege 2340 WMIC.exe Token: 33 2340 WMIC.exe Token: 34 2340 WMIC.exe Token: 35 2340 WMIC.exe Token: 36 2340 WMIC.exe Token: SeBackupPrivilege 492 wbengine.exe Token: SeRestorePrivilege 492 wbengine.exe Token: SeSecurityPrivilege 492 wbengine.exe Token: SeDebugPrivilege 2208 taskmgr.exe Token: SeSystemProfilePrivilege 2208 taskmgr.exe Token: SeCreateGlobalPrivilege 2208 taskmgr.exe Token: SeShutdownPrivilege 3192 SystemSettings.exe Token: SeCreatePagefilePrivilege 3192 SystemSettings.exe -
Suspicious use of FindShellTrayWindow 97 IoCs
Processes:
taskmgr.exepid process 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe -
Suspicious use of SendNotifyMessage 97 IoCs
Processes:
taskmgr.exepid process 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe 2208 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SystemSettings.exepid process 3192 SystemSettings.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
6275a839b5071bf445539c8652d2b13b.exesvchost.exeieinstal.execmd.exedescription pid process target process PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 3976 wrote to memory of 4044 3976 6275a839b5071bf445539c8652d2b13b.exe ieinstal.exe PID 508 wrote to memory of 1384 508 svchost.exe ieinstal.exe PID 508 wrote to memory of 1384 508 svchost.exe ieinstal.exe PID 508 wrote to memory of 1384 508 svchost.exe ieinstal.exe PID 4044 wrote to memory of 1852 4044 ieinstal.exe cmd.exe PID 4044 wrote to memory of 1852 4044 ieinstal.exe cmd.exe PID 1852 wrote to memory of 3936 1852 cmd.exe vssadmin.exe PID 1852 wrote to memory of 3936 1852 cmd.exe vssadmin.exe PID 1852 wrote to memory of 2340 1852 cmd.exe WMIC.exe PID 1852 wrote to memory of 2340 1852 cmd.exe WMIC.exe PID 1852 wrote to memory of 3292 1852 cmd.exe bcdedit.exe PID 1852 wrote to memory of 3292 1852 cmd.exe bcdedit.exe PID 1852 wrote to memory of 1100 1852 cmd.exe bcdedit.exe PID 1852 wrote to memory of 1100 1852 cmd.exe bcdedit.exe PID 1852 wrote to memory of 772 1852 cmd.exe wbadmin.exe PID 1852 wrote to memory of 772 1852 cmd.exe wbadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6275a839b5071bf445539c8652d2b13b.exe"C:\Users\Admin\AppData\Local\Temp\6275a839b5071bf445539c8652d2b13b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\ImmersiveControlPanel\SystemSettings.exe"C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel1⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ieinstal.exeMD5
3c8ef0faf114b5d5f007c201b3f2a1a4
SHA1dc979c1d38c5714313d62ec750c05ba59b085f01
SHA25602480db613c12b9e852a2c2f37ec6fb0b1d1612dbe339e3670d60f20c829761e
SHA5124b7408bd17e51b32188a654ea4edfd01c7f2cbd80d5c00e3cb7195e851e6419161927529727861f4f4e79cae2ce25fe33bcb5950f34a4b4012799d8247c36b54
-
C:\Users\Admin\AppData\Local\ieinstal.exeMD5
3c8ef0faf114b5d5f007c201b3f2a1a4
SHA1dc979c1d38c5714313d62ec750c05ba59b085f01
SHA25602480db613c12b9e852a2c2f37ec6fb0b1d1612dbe339e3670d60f20c829761e
SHA5124b7408bd17e51b32188a654ea4edfd01c7f2cbd80d5c00e3cb7195e851e6419161927529727861f4f4e79cae2ce25fe33bcb5950f34a4b4012799d8247c36b54
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ieinstal.exeMD5
3c8ef0faf114b5d5f007c201b3f2a1a4
SHA1dc979c1d38c5714313d62ec750c05ba59b085f01
SHA25602480db613c12b9e852a2c2f37ec6fb0b1d1612dbe339e3670d60f20c829761e
SHA5124b7408bd17e51b32188a654ea4edfd01c7f2cbd80d5c00e3cb7195e851e6419161927529727861f4f4e79cae2ce25fe33bcb5950f34a4b4012799d8247c36b54
-
C:\Users\Admin\ldfwV.urlMD5
2f01e366c85c9e3acec634da03a36277
SHA138c5c7a7d7daedeae0959b7a461fdc87556f9379
SHA25621c20b571b1379ce9ad0b405116080876510a9d29044267489f89eb73f5f2fa9
SHA51226ee50b3feb56ab2ceaea82454ef22907778aa554b21f472394511ccc10f26d65c7c0e245aad35eb28a0d55d98edf802c2ec2a8f32801fcdf09478bcd9ae6ed6
-
memory/772-20-0x0000000000000000-mapping.dmp
-
memory/1100-19-0x0000000000000000-mapping.dmp
-
memory/1384-14-0x0000000000000000-mapping.dmp
-
memory/1852-15-0x0000000000000000-mapping.dmp
-
memory/2340-17-0x0000000000000000-mapping.dmp
-
memory/3292-18-0x0000000000000000-mapping.dmp
-
memory/3936-16-0x0000000000000000-mapping.dmp
-
memory/3976-2-0x00000000006A0000-0x00000000006A1000-memory.dmpFilesize
4KB
-
memory/4044-13-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/4044-12-0x0000000010530000-0x0000000010545000-memory.dmpFilesize
84KB
-
memory/4044-7-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB
-
memory/4044-5-0x0000000000480000-0x0000000000481000-memory.dmpFilesize
4KB
-
memory/4044-4-0x0000000000000000-mapping.dmp
-
memory/4044-3-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB