Analysis
-
max time kernel
142s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-01-2021 13:57
Static task
static1
Behavioral task
behavioral1
Sample
Photo-064-2021.jpg.scr
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Photo-064-2021.jpg.scr
Resource
win10v20201028
General
-
Target
Photo-064-2021.jpg.scr
-
Size
126KB
-
MD5
ea4cf6019062e5555d81bb5510d79b3d
-
SHA1
0d95aa8ade975b9f85c54cdbabd08906a01e51ee
-
SHA256
9a02671ffb82ee83b8f9afd028af3090ecd494bd7d8d7a2e2cc75f0ac187c3b8
-
SHA512
8f1eb4eb9dd561faf05094552bf6769bbfb614de1c7c96cc568e7f45b22fdcdf7d7d7b518041e1ab15b9781ba85dca69c19b9a75cc85bd4aeea3e0540d9f17c9
Malware Config
Extracted
C:\WERE_MY _FILES.txt
httpps://www.torproject.org/
http://helpqvrg3cc5mvb3.onion/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
smhost.exeswhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\smhost.exe\"" smhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\swhost.exe\"" swhost.exe -
Executes dropped EXE 2 IoCs
Processes:
swhost.exesmhost.exepid process 3152 swhost.exe 3400 smhost.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
aspnet_wp.exedescription ioc process File renamed C:\Users\Admin\Pictures\AddGrant.crw => C:\Users\Admin\Pictures\AddGrant.crw.STAR aspnet_wp.exe File renamed C:\Users\Admin\Pictures\ExitExpand.crw => C:\Users\Admin\Pictures\ExitExpand.crw.STAR aspnet_wp.exe File renamed C:\Users\Admin\Pictures\LimitRead.crw => C:\Users\Admin\Pictures\LimitRead.crw.STAR aspnet_wp.exe File renamed C:\Users\Admin\Pictures\MountUnprotect.tif => C:\Users\Admin\Pictures\MountUnprotect.tif.STAR aspnet_wp.exe File renamed C:\Users\Admin\Pictures\UnblockRestore.png => C:\Users\Admin\Pictures\UnblockRestore.png.STAR aspnet_wp.exe -
Drops startup file 4 IoCs
Processes:
smhost.exeswhost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smhost.exe smhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smhost.exe smhost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\swhost.exe swhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\swhost.exe swhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
swhost.exesmhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\swhost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\swhost.exe" swhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smhost.exe" smhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\swhost.exe" swhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\smhost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\smhost.exe" smhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 28 IoCs
Processes:
aspnet_wp.exedescription ioc process File opened for modification C:\Users\Public\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Videos\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Libraries\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Searches\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Links\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Documents\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Videos\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Documents\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Desktop\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini aspnet_wp.exe File opened for modification C:\Program Files (x86)\desktop.ini aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI aspnet_wp.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3341490333-719741536-2920803124-1000\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Music\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Downloads\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Music\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Public\Pictures\desktop.ini aspnet_wp.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini aspnet_wp.exe File opened for modification C:\Program Files\desktop.ini aspnet_wp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
Processes:
smhost.exeswhost.exepid process 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe 3152 swhost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
swhost.exesmhost.exedescription pid process target process PID 3152 set thread context of 3188 3152 swhost.exe aspnet_wp.exe PID 3400 set thread context of 2816 3400 smhost.exe aspnet_wp.exe -
Drops file in Program Files directory 18481 IoCs
Processes:
aspnet_wp.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main.css aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\3009_24x24x32.png aspnet_wp.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\fi-fi\ui-strings.js aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\kg_16x11.png aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ul-oob.xrm-ms aspnet_wp.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\root\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\WideTile.scale-200.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\offsymb.ttf aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.Xaml.Toolkit\Assets\Buttons\Menu\Menu_back-over.png aspnet_wp.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\jawt_md.h aspnet_wp.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\cs-cz\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\progress_spinner2x.gif aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\WideTile.scale-200.png aspnet_wp.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_asf_plugin.dll aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\lv_get.svg aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-24_altform-unplated.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Autumn\autumn_11h.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1702.301.0_neutral_split.scale-125_8wekyb3d8bbwe\resources.pri aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sk-sk\ui-strings.js aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-gb\ui-strings.js aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-80_contrast-white.png aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hu-hu\ui-strings.js aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\review_email.gif aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsMedTile.scale-200.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\PaintAppList.scale-200.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\28.jpg aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\TextureBitmaps\pitissue.jpg aspnet_wp.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libanaglyph_plugin.dll aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\go-mobile-2x.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\2475_32x32x32.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\me_16x11.png aspnet_wp.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\MANIFEST.MF aspnet_wp.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Adobe.Reader.Dependencies.manifest aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ul-oob.xrm-ms aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-ul-oob.xrm-ms aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\main.css aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\AppTiles\StoreLogo.scale-150.png aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-ul-phn.xrm-ms aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-64_contrast-black.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\Office\Smooth.scale-100.png aspnet_wp.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\WERE_MY _FILES.txt aspnet_wp.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\themes\dark\example_icons.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\6365_36x36x32.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\AppCS\Assets\PhtoMDL2.1.61.ttf aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\Close2x.png aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_OEM_Perp-ul-oob.xrm-ms aspnet_wp.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\pt-br\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\dk_16x11.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\_Resources\1.rsrc aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_25.25.13009.0_neutral_split.scale-200_8wekyb3d8bbwe\AppxManifest.xml aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AlarmsBadge.contrast-black_scale-100.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\manifestAssets\contrast-white\Square71x71Logo.scale-100.png aspnet_wp.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.update.configurator.nl_zh_4.4.0.v20140623020002.jar aspnet_wp.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\cross.png aspnet_wp.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\uk-ua\WERE_MY _FILES.txt aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\AppxSignature.p7x aspnet_wp.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\en\Common.ExcelServices.Resources.dll aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\3416_20x20x32.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNotePageLargeTile.scale-100.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedSplash.scale-100_contrast-white.png aspnet_wp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailWideTile.scale-150.png aspnet_wp.exe -
Drops file in Windows directory 1 IoCs
Processes:
WerFault.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2868 3152 WerFault.exe swhost.exe 2260 3400 WerFault.exe smhost.exe -
Delays execution with timeout.exe 6 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 3912 timeout.exe 196 timeout.exe 212 timeout.exe 4092 timeout.exe 3620 timeout.exe 3292 timeout.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
Photo-064-2021.jpg.scrsmhost.exeswhost.exeWerFault.exeWerFault.exepid process 3160 Photo-064-2021.jpg.scr 3160 Photo-064-2021.jpg.scr 3400 smhost.exe 3152 swhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3400 smhost.exe 3152 swhost.exe 3152 swhost.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2260 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe 2260 WerFault.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
aspnet_wp.exepid process 3188 aspnet_wp.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Photo-064-2021.jpg.scrsmhost.exeswhost.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3160 Photo-064-2021.jpg.scr Token: SeDebugPrivilege 3400 smhost.exe Token: SeDebugPrivilege 3152 swhost.exe Token: SeRestorePrivilege 2260 WerFault.exe Token: SeBackupPrivilege 2260 WerFault.exe Token: SeRestorePrivilege 2868 WerFault.exe Token: SeBackupPrivilege 2868 WerFault.exe Token: SeBackupPrivilege 2868 WerFault.exe Token: SeDebugPrivilege 2868 WerFault.exe Token: SeDebugPrivilege 2260 WerFault.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
Photo-064-2021.jpg.scrsmhost.exeswhost.execmd.execmd.execmd.execmd.execmd.execmd.exeaspnet_wp.exedescription pid process target process PID 3160 wrote to memory of 3152 3160 Photo-064-2021.jpg.scr swhost.exe PID 3160 wrote to memory of 3152 3160 Photo-064-2021.jpg.scr swhost.exe PID 3160 wrote to memory of 3152 3160 Photo-064-2021.jpg.scr swhost.exe PID 3160 wrote to memory of 3400 3160 Photo-064-2021.jpg.scr smhost.exe PID 3160 wrote to memory of 3400 3160 Photo-064-2021.jpg.scr smhost.exe PID 3160 wrote to memory of 3400 3160 Photo-064-2021.jpg.scr smhost.exe PID 3400 wrote to memory of 2484 3400 smhost.exe cmd.exe PID 3400 wrote to memory of 2484 3400 smhost.exe cmd.exe PID 3400 wrote to memory of 2484 3400 smhost.exe cmd.exe PID 3152 wrote to memory of 2488 3152 swhost.exe cmd.exe PID 3152 wrote to memory of 2488 3152 swhost.exe cmd.exe PID 3152 wrote to memory of 2488 3152 swhost.exe cmd.exe PID 2488 wrote to memory of 212 2488 cmd.exe timeout.exe PID 2484 wrote to memory of 196 2484 cmd.exe timeout.exe PID 2488 wrote to memory of 212 2488 cmd.exe timeout.exe PID 2488 wrote to memory of 212 2488 cmd.exe timeout.exe PID 2484 wrote to memory of 196 2484 cmd.exe timeout.exe PID 2484 wrote to memory of 196 2484 cmd.exe timeout.exe PID 3400 wrote to memory of 2084 3400 smhost.exe cmd.exe PID 3400 wrote to memory of 2084 3400 smhost.exe cmd.exe PID 3400 wrote to memory of 2084 3400 smhost.exe cmd.exe PID 3152 wrote to memory of 2092 3152 swhost.exe cmd.exe PID 3152 wrote to memory of 2092 3152 swhost.exe cmd.exe PID 3152 wrote to memory of 2092 3152 swhost.exe cmd.exe PID 2084 wrote to memory of 4092 2084 cmd.exe timeout.exe PID 2084 wrote to memory of 4092 2084 cmd.exe timeout.exe PID 2084 wrote to memory of 4092 2084 cmd.exe timeout.exe PID 2092 wrote to memory of 3620 2092 cmd.exe timeout.exe PID 2092 wrote to memory of 3620 2092 cmd.exe timeout.exe PID 2092 wrote to memory of 3620 2092 cmd.exe timeout.exe PID 3400 wrote to memory of 3724 3400 smhost.exe cmd.exe PID 3400 wrote to memory of 3724 3400 smhost.exe cmd.exe PID 3400 wrote to memory of 3724 3400 smhost.exe cmd.exe PID 3152 wrote to memory of 764 3152 swhost.exe cmd.exe PID 3152 wrote to memory of 764 3152 swhost.exe cmd.exe PID 3152 wrote to memory of 764 3152 swhost.exe cmd.exe PID 3724 wrote to memory of 3292 3724 cmd.exe timeout.exe PID 3724 wrote to memory of 3292 3724 cmd.exe timeout.exe PID 3724 wrote to memory of 3292 3724 cmd.exe timeout.exe PID 764 wrote to memory of 3912 764 cmd.exe timeout.exe PID 764 wrote to memory of 3912 764 cmd.exe timeout.exe PID 764 wrote to memory of 3912 764 cmd.exe timeout.exe PID 3400 wrote to memory of 496 3400 smhost.exe aspnet_wp.exe PID 3400 wrote to memory of 496 3400 smhost.exe aspnet_wp.exe PID 3400 wrote to memory of 496 3400 smhost.exe aspnet_wp.exe PID 3152 wrote to memory of 3188 3152 swhost.exe aspnet_wp.exe PID 3152 wrote to memory of 3188 3152 swhost.exe aspnet_wp.exe PID 3152 wrote to memory of 3188 3152 swhost.exe aspnet_wp.exe PID 3400 wrote to memory of 2816 3400 smhost.exe aspnet_wp.exe PID 3400 wrote to memory of 2816 3400 smhost.exe aspnet_wp.exe PID 3400 wrote to memory of 2816 3400 smhost.exe aspnet_wp.exe PID 3152 wrote to memory of 3188 3152 swhost.exe aspnet_wp.exe PID 3152 wrote to memory of 3188 3152 swhost.exe aspnet_wp.exe PID 3152 wrote to memory of 3188 3152 swhost.exe aspnet_wp.exe PID 3152 wrote to memory of 3188 3152 swhost.exe aspnet_wp.exe PID 3400 wrote to memory of 2816 3400 smhost.exe aspnet_wp.exe PID 3400 wrote to memory of 2816 3400 smhost.exe aspnet_wp.exe PID 3400 wrote to memory of 2816 3400 smhost.exe aspnet_wp.exe PID 3400 wrote to memory of 2816 3400 smhost.exe aspnet_wp.exe PID 3400 wrote to memory of 2816 3400 smhost.exe aspnet_wp.exe PID 3188 wrote to memory of 4056 3188 aspnet_wp.exe cmd.exe PID 3188 wrote to memory of 4056 3188 aspnet_wp.exe cmd.exe PID 3188 wrote to memory of 4056 3188 aspnet_wp.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Photo-064-2021.jpg.scr"C:\Users\Admin\AppData\Local\Temp\Photo-064-2021.jpg.scr" /S1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\swhost.exe"C:\Users\Admin\AppData\Local\Temp\swhost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:3620 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:3912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"3⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe > nul4⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 16763⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\smhost.exe"C:\Users\Admin\AppData\Local\Temp\smhost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:4092 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
PID:3292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"3⤵PID:496
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"3⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 16043⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
af2583b628a62640d1f4bfdf2075863a
SHA1cafe9a9d2deedb443d52a93a45e99a385e4f65f2
SHA256e8a664c32b08dfaa11ee755ac9a5890214029395eff64ee009366c8cbf8cf3d4
SHA51213a771b634b726fe2b5b71886b4c7875ca4ab6e2d0061074a1d66bd98f555c72cf43349ff1ab9de2166ca261851950e266b67a74995bd21efac37addc4c04688
-
MD5
654e98d30719de2b197311aadece41d2
SHA1e2dc9f7a0256621e767fe2d0ce3b251ab2c037fd
SHA256b624fba4e93efc188408233ae3b7b3c43f0461cfd728bdc7d7c70eeb680a5c26
SHA512ca0d80526849a271925321717f8ba062892722f21ef08a197f208dedc31e34f078bacdfe6beef139ed278461a8ee7c2b4badde5a1c20f39d5d3097e90385ccf4
-
MD5
654e98d30719de2b197311aadece41d2
SHA1e2dc9f7a0256621e767fe2d0ce3b251ab2c037fd
SHA256b624fba4e93efc188408233ae3b7b3c43f0461cfd728bdc7d7c70eeb680a5c26
SHA512ca0d80526849a271925321717f8ba062892722f21ef08a197f208dedc31e34f078bacdfe6beef139ed278461a8ee7c2b4badde5a1c20f39d5d3097e90385ccf4
-
MD5
9e96c9967287f92f1646c0c8a68f3a48
SHA153401dab53f27cab59e5e2f2e2d7d8bfa3699744
SHA256b144cea70ef357f52b0b3fdcad315d0df095c563c2cbe535fb45354133db6a2b
SHA5121acd812c5e93fff4686c3f93f503196660bfc44b9257f5af850b18fd19fd7d82c74c0fc878e79240b1250e6c5168a54bcae7a806f696d5f09b69c197ab8eb924
-
MD5
9e96c9967287f92f1646c0c8a68f3a48
SHA153401dab53f27cab59e5e2f2e2d7d8bfa3699744
SHA256b144cea70ef357f52b0b3fdcad315d0df095c563c2cbe535fb45354133db6a2b
SHA5121acd812c5e93fff4686c3f93f503196660bfc44b9257f5af850b18fd19fd7d82c74c0fc878e79240b1250e6c5168a54bcae7a806f696d5f09b69c197ab8eb924