Resubmissions
17-01-2021 18:37
210117-48aq437xb6 617-01-2021 17:45
210117-4744q9x4dx 1017-01-2021 17:15
210117-srj9q38nvj 1013-01-2021 06:09
210113-qmgklkv3dn 10Analysis
-
max time kernel
56s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-01-2021 17:45
Static task
static1
Behavioral task
behavioral1
Sample
3dcd284892131ed336b5801c7993d3ed.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
3dcd284892131ed336b5801c7993d3ed.exe
Resource
win10v20201028
General
-
Target
3dcd284892131ed336b5801c7993d3ed.exe
-
Size
1.8MB
-
MD5
3dcd284892131ed336b5801c7993d3ed
-
SHA1
b1055faf8ac2c14ce5c45f1954c45f7ab6a986eb
-
SHA256
9c748a69c48b79e6422b3bea1766e415de5532cb7ba2b9673d5a51163e6c1df2
-
SHA512
9fb9ee8903ded8051ca40b1d6f780c7b475255987ee592e35ccebc7119fdef6202f2f80b47e00eedb1434649c299eea1f1f3580d1a65f9c19d54e6626f9e4b76
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WindowsNetworkManager.exepid process 2360 WindowsNetworkManager.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
WindowsNetworkManager.exedescription ioc process File created C:\Users\Admin\Pictures\CompressConfirm.tif.v316 WindowsNetworkManager.exe File created C:\Users\Admin\Pictures\RenameDebug.raw.v316 WindowsNetworkManager.exe -
Deletes itself 1 IoCs
Processes:
WindowsNetworkManager.exepid process 2360 WindowsNetworkManager.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3dcd284892131ed336b5801c7993d3ed.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\SystemRec.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\Z-6-8-02-0147281012-018237041-9816430924-9142\\P-1-5-16-7923435274-12478148975817408994-4122\\SystemRec.exe" 3dcd284892131ed336b5801c7993d3ed.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
3dcd284892131ed336b5801c7993d3ed.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 3dcd284892131ed336b5801c7993d3ed.exe File opened for modification C:\Windows\assembly\Desktop.ini 3dcd284892131ed336b5801c7993d3ed.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 checkip.dyndns.org -
Drops file in System32 directory 3 IoCs
Processes:
WindowsNetworkManager.exe3dcd284892131ed336b5801c7993d3ed.exedescription ioc process File created C:\Windows\SysWOW64\msmgr.exe WindowsNetworkManager.exe File created C:\Windows\SysWOW64\msmgr.exe 3dcd284892131ed336b5801c7993d3ed.exe File opened for modification C:\Windows\SysWOW64\msmgr.exe 3dcd284892131ed336b5801c7993d3ed.exe -
Drops file in Program Files directory 5351 IoCs
Processes:
WindowsNetworkManager.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AlarmsSmallTile.contrast-black_scale-100.png WindowsNetworkManager.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\card_expiration_terms_dict.txt WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\MainPageState2\see_all_bp_920.jpg WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.3_1.3.23901.0_x86__8wekyb3d8bbwe\AppxBlockMap.xml WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\SmallLogo.scale-150.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\6536_48x48x32.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-black_targetsize-40.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\MainPageState2\statistics_bp_920.jpg WindowsNetworkManager.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\tzdb.dat.v316 WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-96_altform-unplated_contrast-black.png WindowsNetworkManager.exe File created C:\Program Files\Microsoft Office\root\rsod\osmux.x-none.msi.16.x-none.boot.tree.dat.v316 WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11701.1001.87.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\starttile.dualsim1.surprise.small.scale-150.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorMedTile.contrast-black_scale-125.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxA-GoogleCloudCache-Light.scale-240.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\7205_24x24x32.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-60_altform-unplated.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\StarClub\star.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ThemeDownload\download_bar.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\osf\miniinfoblue_16x16x32.png WindowsNetworkManager.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0409-1000-0000000FF1CE.xml.v316 WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\3009_32x32x32.png WindowsNetworkManager.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\Training.potx WindowsNetworkManager.exe File opened for modification C:\Program Files\7-Zip\History.txt WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ThemeCreation\themes_page_menu_button.jpg WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_neutral_split.scale-180_8wekyb3d8bbwe\Assets\Office\StickySelection.scale-180.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GetStartedMedTile.scale-200_contrast-black.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\starttile.smile.scale-150.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxA-Yahoo-Light.scale-300.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-20_altform-unplated_contrast-high.png WindowsNetworkManager.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.bmp WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\DashboardDefaultThumbnail.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.targetsize-48_altform-unplated.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\1725_48x48x32.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_x64__8wekyb3d8bbwe\Assets\contrast-black\OneConnectAppList.targetsize-80.png WindowsNetworkManager.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\osmuxmui.msi.16.en-us.boot.tree.dat WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\7296_20x20x32.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Assets\CalculatorSmallTile.scale-200.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxA-Advanced-Dark.scale-150.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxA-Yahoo-Light.scale-150.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxA-Advanced-Light.scale-250.png WindowsNetworkManager.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xml WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-80_altform-unplated_contrast-white.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedMedTile.scale-100.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\6486_24x24x32.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\GenericMailBadge.scale-200.png WindowsNetworkManager.exe File created C:\Program Files\Java\jre1.8.0_66\lib\resources.jar.v316 WindowsNetworkManager.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\EssentialResume.dotx.v316 WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\Assets\FileIcons\FileLogoExtensions.targetsize-20.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Livetiles\MicrosoftSolitaireAppList.targetsize-16_altform-unplated.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-48_altform-unplated.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\1849_24x24x32.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\LinkedInboxMediumTile.scale-100.png WindowsNetworkManager.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red Orange.xml WindowsNetworkManager.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense2019_eula.txt.v316 WindowsNetworkManager.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-140.png.v316 WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_1.4.101.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_1.4.101.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-256_altform-unplated.png WindowsNetworkManager.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.scale-200.png WindowsNetworkManager.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\card_security_terms_dict.txt WindowsNetworkManager.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-white_scale-180.png WindowsNetworkManager.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt WindowsNetworkManager.exe -
Drops file in Windows directory 3 IoCs
Processes:
3dcd284892131ed336b5801c7993d3ed.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 3dcd284892131ed336b5801c7993d3ed.exe File opened for modification C:\Windows\assembly\Desktop.ini 3dcd284892131ed336b5801c7993d3ed.exe File opened for modification C:\Windows\assembly 3dcd284892131ed336b5801c7993d3ed.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 84 IoCs
Processes:
3dcd284892131ed336b5801c7993d3ed.exeWindowsNetworkManager.exetaskmgr.exepid process 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 4000 3dcd284892131ed336b5801c7993d3ed.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2360 WindowsNetworkManager.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
3dcd284892131ed336b5801c7993d3ed.exeWindowsNetworkManager.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 4000 3dcd284892131ed336b5801c7993d3ed.exe Token: SeDebugPrivilege 2360 WindowsNetworkManager.exe Token: SeDebugPrivilege 2076 taskmgr.exe Token: SeSystemProfilePrivilege 2076 taskmgr.exe Token: SeCreateGlobalPrivilege 2076 taskmgr.exe Token: 33 2076 taskmgr.exe Token: SeIncBasePriorityPrivilege 2076 taskmgr.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
Processes:
taskmgr.exepid process 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe -
Suspicious use of SendNotifyMessage 63 IoCs
Processes:
taskmgr.exepid process 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe 2076 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3dcd284892131ed336b5801c7993d3ed.exedescription pid process target process PID 4000 wrote to memory of 2360 4000 3dcd284892131ed336b5801c7993d3ed.exe WindowsNetworkManager.exe PID 4000 wrote to memory of 2360 4000 3dcd284892131ed336b5801c7993d3ed.exe WindowsNetworkManager.exe PID 4000 wrote to memory of 2360 4000 3dcd284892131ed336b5801c7993d3ed.exe WindowsNetworkManager.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dcd284892131ed336b5801c7993d3ed.exe"C:\Users\Admin\AppData\Local\Temp\3dcd284892131ed336b5801c7993d3ed.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Microsoft\Windows\WindowsNetworkManager.exe"C:\Microsoft\Windows\WindowsNetworkManager.exe" C:\Users\Admin\AppData\Local\Temp\3dcd284892131ed336b5801c7993d3ed.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Deletes itself
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3dcd284892131ed336b5801c7993d3ed
SHA1b1055faf8ac2c14ce5c45f1954c45f7ab6a986eb
SHA2569c748a69c48b79e6422b3bea1766e415de5532cb7ba2b9673d5a51163e6c1df2
SHA5129fb9ee8903ded8051ca40b1d6f780c7b475255987ee592e35ccebc7119fdef6202f2f80b47e00eedb1434649c299eea1f1f3580d1a65f9c19d54e6626f9e4b76
-
MD5
3dcd284892131ed336b5801c7993d3ed
SHA1b1055faf8ac2c14ce5c45f1954c45f7ab6a986eb
SHA2569c748a69c48b79e6422b3bea1766e415de5532cb7ba2b9673d5a51163e6c1df2
SHA5129fb9ee8903ded8051ca40b1d6f780c7b475255987ee592e35ccebc7119fdef6202f2f80b47e00eedb1434649c299eea1f1f3580d1a65f9c19d54e6626f9e4b76
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Z-6-8-02-0147281012-018237041-9816430924-9142\P-1-5-16-7923435274-12478148975817408994-4122\SystemRec.exe
MD53dcd284892131ed336b5801c7993d3ed
SHA1b1055faf8ac2c14ce5c45f1954c45f7ab6a986eb
SHA2569c748a69c48b79e6422b3bea1766e415de5532cb7ba2b9673d5a51163e6c1df2
SHA5129fb9ee8903ded8051ca40b1d6f780c7b475255987ee592e35ccebc7119fdef6202f2f80b47e00eedb1434649c299eea1f1f3580d1a65f9c19d54e6626f9e4b76