Analysis
-
max time kernel
109s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-01-2021 14:14
Static task
static1
Behavioral task
behavioral1
Sample
af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe
Resource
win10v20201028
General
-
Target
af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe
-
Size
66KB
-
MD5
1b033111b8923c12f1d84e09769806f5
-
SHA1
2ab84be1752574bac3ad0f9a8f9107fa5657033a
-
SHA256
af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa
-
SHA512
2c47a5121eb0cd965f29b934a2a8536da7245eee42c7e66987410b537240f502a4b94263423ced8600be9a6fa61540bb218d4fa9f2213b888b28f0e331462c9c
Malware Config
Extracted
C:\8D9DA2-Readme.txt
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Program Files\8D9DA2-Readme.txt
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Program Files\Google\Chrome\Application\86.0.4240.111\8D9DA2-Readme.txt
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\CompressMount.tiff af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Users\Admin\Pictures\RevokePush.tiff af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\CompressMount.tiff => C:\Users\Admin\Pictures\CompressMount.tiff.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\DismountResume.png => C:\Users\Admin\Pictures\DismountResume.png.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\UpdateMerge.raw => C:\Users\Admin\Pictures\UpdateMerge.raw.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\BackupMeasure.crw => C:\Users\Admin\Pictures\BackupMeasure.crw.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\RevokePush.tiff => C:\Users\Admin\Pictures\RevokePush.tiff.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\SyncEdit.tiff => C:\Users\Admin\Pictures\SyncEdit.tiff.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Users\Admin\Pictures\SyncEdit.tiff af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\ConvertExit.raw => C:\Users\Admin\Pictures\ConvertExit.raw.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\StepCompress.tif => C:\Users\Admin\Pictures\StepCompress.tif.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\UndoSplit.tif => C:\Users\Admin\Pictures\UndoSplit.tif.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File renamed C:\Users\Admin\Pictures\RenamePing.png => C:\Users\Admin\Pictures\RenamePing.png.8d9da2 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 19576 IoCs
Processes:
af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exedescription ioc process File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\System.ServiceModel.Web.dll af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2017.125.40.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraMedTile.contrast-white_scale-125.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Configuration.winmd af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\unpack200.exe af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hu-hu\8D9DA2-Readme.txt af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\rhp_world_icon_hover.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jsse.jar af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\[email protected] af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\LibCurl64.DllA\OpenSSL64.DllA\libcrypto-1_1-x64.dll af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libscene_plugin.dll af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\bbc_co_uk.luac af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.scale-100.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxMailMediumTile.scale-100.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxCalendarMediumTile.scale-150.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_16.511.8780.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\PhotosAppList.scale-100.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Aquarium\aquarium_11d.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\6701_32x32x32.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-180.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_17.8010.5926.0_x64__8wekyb3d8bbwe\Officehub_Base_PriConfig.xml af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\10.jpg af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\OSFPROXY.DLL af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\az_get.svg af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\8D9DA2-Readme.txt af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.AnalysisServices.Common.dll af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\animations\OneNoteFRE_ClipAndAdd_LTR_Tablet.mp4 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\1937_40x40x32.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\xs_60x42.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Yahoo-Light.scale-125.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\tr-tr\ui-strings.js af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\8D9DA2-Readme.txt af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Trial-ul-oob.xrm-ms af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\[email protected] af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\uk-ua\ui-strings.js af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-80.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{0C5D4CDF-5D9D-4019-A7CB-FAAD082B42AB}\86.0.4240.111_chrome_installer.exe af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\EmbossBitmaps\Arrow_icon.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1612.10312.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-256_contrast-white.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1.10531.0_x64__8wekyb3d8bbwe\Microsoft.Apps.People.BackgroundTasks.winmd af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\DailyChallenges\LobbyTiles\Pyramid_bp_809.jpg af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\8D9DA2-Readme.txt af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\8D9DA2-Readme.txt af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\hu-hu\ui-strings.js af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2017.125.40.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\StoreLogo.contrast-black_scale-100.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeSmallTile.scale-100.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ICE\PREVIEW.GIF af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RIPPLE\8D9DA2-Readme.txt af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\vlc.mo af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Icons\tripeaks_icon.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-80_altform-unplated.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailSmallTile.scale-125.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\illustrations_retina.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ro\msipc.dll.mui af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Office.Interop.Excel.dll af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.Awards\Assets\awards_years_base.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.16112.11621.0_x64__8wekyb3d8bbwe\Music.UI.exe af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1612.10312.0_x64__8wekyb3d8bbwe\ClrCompression.dll af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\Assets\PhotosLogoExtensions.targetsize-20.png af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\8D9DA2-Readme.txt af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Trial-ppd.xrm-ms af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_25.25.13009.0_neutral_split.scale-200_8wekyb3d8bbwe\AppxBlockMap.xml af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\_Resources\0.rsrc af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\1033\EEINTL.DLL af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 5320 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 15598 IoCs
Processes:
af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exepid process 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe Token: SeImpersonatePrivilege 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe Token: SeDebugPrivilege 5320 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.execmd.exedescription pid process target process PID 1308 wrote to memory of 3400 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe notepad.exe PID 1308 wrote to memory of 3400 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe notepad.exe PID 1308 wrote to memory of 3400 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe notepad.exe PID 1308 wrote to memory of 7796 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe cmd.exe PID 1308 wrote to memory of 7796 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe cmd.exe PID 1308 wrote to memory of 7796 1308 af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe cmd.exe PID 7796 wrote to memory of 5320 7796 cmd.exe taskkill.exe PID 7796 wrote to memory of 5320 7796 cmd.exe taskkill.exe PID 7796 wrote to memory of 5320 7796 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe"C:\Users\Admin\AppData\Local\Temp\af03b1a30294baaca1cdb803f86a6bed945aa69544cb3d37fb99f1412568b7aa.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\8D9DA2-Readme.txt"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\7178.tmp.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 13083⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7178.tmp.batMD5
05ddd71e6fa01385c29305d7faf00386
SHA12562b52dac0de2438a481931ad16a9f109e12992
SHA2564f7960026c4b7c01f3f6f68bb2a120c7293301536f1c5c64ad7b22e9ea852a3c
SHA512271765bcceca2c67d1c14100d4908920c2657484775b0c09fb348326e44b35a70eaadd26765ab092a676719620b0a4ef2e91a40c09b7559a3bd1a32072886061
-
C:\Users\Admin\Desktop\8D9DA2-Readme.txtMD5
8d1193a786e5889f661da29c740b41b5
SHA108dda8bf664f790158ced1a02f36ab6fa705102a
SHA256d582f114316d85118a936d8fc5b15b3e57d269b8ec9db2f9b66a9e3ca2ea878a
SHA512fe1a4c0d4b2f07c1fcb28a274629f7a771bf1ec4aeb3e54ad6aae524687c78d0072ae58c44481d07a53677fac2893b61c9a9021ce708a2a5bf7fe1a73cce2e0b
-
memory/3400-2-0x0000000000000000-mapping.dmp
-
memory/5320-5-0x0000000000000000-mapping.dmp
-
memory/7796-3-0x0000000000000000-mapping.dmp