Analysis
-
max time kernel
60s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12/02/2021, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
___________.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
___________.exe
Resource
win10v20201028
General
-
Target
___________.exe
-
Size
48KB
-
MD5
221f1b97cd8e9766bebd001960b31dc4
-
SHA1
4c3367638ffca90ae5eb5a644a9beaec1853f36c
-
SHA256
a5f47b1b2efcf8bd7e36a072941fb9ee0ce780e6f410d6c85c503ccea24d29e6
-
SHA512
7e86b0fc428b8fc97251eb0bf2639b2c780d7a45b730b475794107312e6edd963355aca59c8eee34380800006531a8dbeae152f3542291f0c3154c0d1fbb96d6
Malware Config
Extracted
C:\Users\Admin\Desktop\info.hta
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1696 3dcgfq5j.exe 1396 91.exe -
Loads dropped DLL 1 IoCs
pid Process 1696 3dcgfq5j.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\license.rtf 91.exe File created C:\Windows\SysWOW64\locationnotificationsview.xml 91.exe File opened for modification C:\Windows\SysWOW64\license.rtf.paralock 91.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-keyring.xml 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Grid.xml 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jvm.xml.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Perspective.xml 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\gradient.png 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewAttachmentIcons.jpg 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jvm.hprof.txt.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-templates.xml.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-core.xml.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host.xml.paralock 91.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 91.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_150.png 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7TSFrame.png.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-bootstrap.xml 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange.css 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis.css.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-uisupport.xml 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Black Tie.xml 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-charts.xml.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Austin.xml.paralock 91.exe File created C:\Program Files\Windows Media Player\Network Sharing\ConnectionManager.xml 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_FileOffMask.bmp 91.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Class.zip 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-masterfs-nio2.xml.paralock 91.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-views.xml 91.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\license.html.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-awt.xml.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\computericon.jpg.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml.paralock 91.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffffff_256x240.png.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Module.xml.paralock 91.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt.paralock 91.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\GlobeButtonImage.jpg.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_gtk.css 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7TSFrame.png 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Couture.xml 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewAttachmentIcons.jpg 91.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\blocklist.xml.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DigitalInk.jpg.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\high-contrast.css 91.exe File created C:\Program Files\Windows NT\TableTextService\TableTextServiceAmharic.txt 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-favorites.xml.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-explorer.xml.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierDownArrow.jpg.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Discussion\DiscussionToolIconImages.jpg.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsPrintTemplate.html.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\feature.xml 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\QuestionIcon.jpg 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\RELEASE-NOTES.html.paralock 91.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\THIRDPARTYLICENSEREADME.txt 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Grayscale.xml.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsIncomingImageSmall.jpg 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\StopIconMask.bmp.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsImageTemplate.html.paralock 91.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Earthy.css.paralock 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html 91.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-api.xml 91.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SQL\en\SqlWorkflowInstanceStoreSchema.sql 91.exe File opened for modification C:\Windows\Vss\Writers\System\D61D61C8-D73A-4EEE-8CDD-F6F9786B7124.xml 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\ManageAppSettings.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\UninstallMembership.sql.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\WebAdminHelp.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ThirdPartyNotices.txt 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\WebAdminHelp.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Security\Roles\manageAllRoles.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\WebAdminStyles.css.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1033\LocalizedData.xml.paralock 91.exe File created C:\Windows\info.hta 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\AppConfig\DebugAndTrace.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SQL\en\SqlPersistenceService_Logic.sql.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\topGradRepeat.jpg 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\error.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\WebAdminHelp_Security.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\SQL\en\DropSqlWorkflowInstanceStoreSchema.sql.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\InstallSqlStateTemplate.sql 91.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\security0.aspx.paralock 91.exe File opened for modification C:\Windows\Panther\unattend.xml.paralock 91.exe File created C:\Windows\Globalization\MCT\MCT-CA\Wallpaper\CA-wp1.jpg 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallPersistSqlState.sql 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1053\eula.rtf 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1041\LocalizedData.xml 91.exe File created C:\Windows\servicing\Editions\EditionMatrix.xml 91.exe File opened for modification C:\Windows\Vss\Writers\System\0bada1de-01a9-4625-8278-69e735f39dd2.xml 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\DefineErrorPage.aspx 91.exe File created C:\Windows\PLA\Reports\Report.System.Common.xml 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\WebAdminHelp_Internals.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\UninstallSqlStateTemplate.sql 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\UninstallSqlState.sql 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\AppConfigHome.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Security\Users\manageUsers.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v3.0\Windows Workflow Foundation\SQL\en\SqlPersistenceService_Schema.sql.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallPersistSqlState.sql.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\UninstallWebEventSqlProvider.sql.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1031\LocalizedData.xml.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\WebAdminHelp_Application.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Roles\manageAllRoles.aspx 91.exe File created C:\Windows\Microsoft.NET\Framework64\v3.5\SQL\EN\DropSqlPersistenceProviderLogic.sql 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\help.jpg.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\topGradRepeat.jpg.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\2052\eula.rtf.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Security\Wizard\wizard.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\InstallWebEventSqlProvider.sql.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\security.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SplashScreen.bmp.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1040\eula.rtf.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\error.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\DefineErrorPage.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config\DefaultWsdlHelpGenerator.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\DefaultWsdlHelpGenerator.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1049\LocalizedData.xml 91.exe File opened for modification C:\Windows\Panther\diagwrn.xml 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\home0.aspx.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallPersistSqlState.sql.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallSqlStateTemplate.sql 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\WebAdminHelp.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\AppConfig\DebugAndTrace.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1053\LocalizedData.xml.paralock 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Providers\chooseProviderManagement.aspx 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1037\LocalizedData.xml 91.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\UiInfo.xml.paralock 91.exe -
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 900 vssadmin.exe 1456 vssadmin.exe 1892 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 1768 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1696 3dcgfq5j.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe 644 ___________.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 644 ___________.exe Token: SeDebugPrivilege 1768 taskkill.exe Token: SeDebugPrivilege 1696 3dcgfq5j.exe Token: SeDebugPrivilege 1396 91.exe Token: 33 1396 91.exe Token: SeIncBasePriorityPrivilege 1396 91.exe Token: SeIncreaseQuotaPrivilege 1256 WMIC.exe Token: SeSecurityPrivilege 1256 WMIC.exe Token: SeTakeOwnershipPrivilege 1256 WMIC.exe Token: SeLoadDriverPrivilege 1256 WMIC.exe Token: SeSystemProfilePrivilege 1256 WMIC.exe Token: SeSystemtimePrivilege 1256 WMIC.exe Token: SeProfSingleProcessPrivilege 1256 WMIC.exe Token: SeIncBasePriorityPrivilege 1256 WMIC.exe Token: SeCreatePagefilePrivilege 1256 WMIC.exe Token: SeBackupPrivilege 1256 WMIC.exe Token: SeRestorePrivilege 1256 WMIC.exe Token: SeShutdownPrivilege 1256 WMIC.exe Token: SeDebugPrivilege 1256 WMIC.exe Token: SeSystemEnvironmentPrivilege 1256 WMIC.exe Token: SeRemoteShutdownPrivilege 1256 WMIC.exe Token: SeUndockPrivilege 1256 WMIC.exe Token: SeManageVolumePrivilege 1256 WMIC.exe Token: 33 1256 WMIC.exe Token: 34 1256 WMIC.exe Token: 35 1256 WMIC.exe Token: SeBackupPrivilege 1180 vssvc.exe Token: SeRestorePrivilege 1180 vssvc.exe Token: SeAuditPrivilege 1180 vssvc.exe Token: SeIncreaseQuotaPrivilege 1256 WMIC.exe Token: SeSecurityPrivilege 1256 WMIC.exe Token: SeTakeOwnershipPrivilege 1256 WMIC.exe Token: SeLoadDriverPrivilege 1256 WMIC.exe Token: SeSystemProfilePrivilege 1256 WMIC.exe Token: SeSystemtimePrivilege 1256 WMIC.exe Token: SeProfSingleProcessPrivilege 1256 WMIC.exe Token: SeIncBasePriorityPrivilege 1256 WMIC.exe Token: SeCreatePagefilePrivilege 1256 WMIC.exe Token: SeBackupPrivilege 1256 WMIC.exe Token: SeRestorePrivilege 1256 WMIC.exe Token: SeShutdownPrivilege 1256 WMIC.exe Token: SeDebugPrivilege 1256 WMIC.exe Token: SeSystemEnvironmentPrivilege 1256 WMIC.exe Token: SeRemoteShutdownPrivilege 1256 WMIC.exe Token: SeUndockPrivilege 1256 WMIC.exe Token: SeManageVolumePrivilege 1256 WMIC.exe Token: 33 1256 WMIC.exe Token: 34 1256 WMIC.exe Token: 35 1256 WMIC.exe Token: SeIncreaseQuotaPrivilege 1436 WMIC.exe Token: SeSecurityPrivilege 1436 WMIC.exe Token: SeTakeOwnershipPrivilege 1436 WMIC.exe Token: SeLoadDriverPrivilege 1436 WMIC.exe Token: SeSystemProfilePrivilege 1436 WMIC.exe Token: SeSystemtimePrivilege 1436 WMIC.exe Token: SeProfSingleProcessPrivilege 1436 WMIC.exe Token: SeIncBasePriorityPrivilege 1436 WMIC.exe Token: SeCreatePagefilePrivilege 1436 WMIC.exe Token: SeBackupPrivilege 1436 WMIC.exe Token: SeRestorePrivilege 1436 WMIC.exe Token: SeShutdownPrivilege 1436 WMIC.exe Token: SeDebugPrivilege 1436 WMIC.exe Token: SeSystemEnvironmentPrivilege 1436 WMIC.exe Token: SeRemoteShutdownPrivilege 1436 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 644 ___________.exe 644 ___________.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 2044 644 ___________.exe 26 PID 644 wrote to memory of 2044 644 ___________.exe 26 PID 644 wrote to memory of 2044 644 ___________.exe 26 PID 1740 wrote to memory of 1696 1740 cmd.exe 30 PID 1740 wrote to memory of 1696 1740 cmd.exe 30 PID 1740 wrote to memory of 1696 1740 cmd.exe 30 PID 1740 wrote to memory of 1696 1740 cmd.exe 30 PID 1696 wrote to memory of 1396 1696 3dcgfq5j.exe 38 PID 1696 wrote to memory of 1396 1696 3dcgfq5j.exe 38 PID 1696 wrote to memory of 1396 1696 3dcgfq5j.exe 38 PID 1696 wrote to memory of 1396 1696 3dcgfq5j.exe 38 PID 1696 wrote to memory of 1712 1696 3dcgfq5j.exe 39 PID 1696 wrote to memory of 1712 1696 3dcgfq5j.exe 39 PID 1696 wrote to memory of 1712 1696 3dcgfq5j.exe 39 PID 1696 wrote to memory of 1712 1696 3dcgfq5j.exe 39 PID 1712 wrote to memory of 1732 1712 cmd.exe 41 PID 1712 wrote to memory of 1732 1712 cmd.exe 41 PID 1712 wrote to memory of 1732 1712 cmd.exe 41 PID 1712 wrote to memory of 1732 1712 cmd.exe 41 PID 1396 wrote to memory of 1416 1396 91.exe 45 PID 1396 wrote to memory of 1416 1396 91.exe 45 PID 1396 wrote to memory of 1416 1396 91.exe 45 PID 1396 wrote to memory of 1416 1396 91.exe 45 PID 1396 wrote to memory of 1972 1396 91.exe 47 PID 1396 wrote to memory of 1972 1396 91.exe 47 PID 1396 wrote to memory of 1972 1396 91.exe 47 PID 1396 wrote to memory of 1972 1396 91.exe 47 PID 1396 wrote to memory of 1980 1396 91.exe 48 PID 1396 wrote to memory of 1980 1396 91.exe 48 PID 1396 wrote to memory of 1980 1396 91.exe 48 PID 1396 wrote to memory of 1980 1396 91.exe 48 PID 1416 wrote to memory of 900 1416 cmd.exe 51 PID 1416 wrote to memory of 900 1416 cmd.exe 51 PID 1416 wrote to memory of 900 1416 cmd.exe 51 PID 1416 wrote to memory of 900 1416 cmd.exe 51 PID 1972 wrote to memory of 1256 1972 cmd.exe 52 PID 1972 wrote to memory of 1256 1972 cmd.exe 52 PID 1972 wrote to memory of 1256 1972 cmd.exe 52 PID 1972 wrote to memory of 1256 1972 cmd.exe 52 PID 1396 wrote to memory of 996 1396 91.exe 55 PID 1396 wrote to memory of 996 1396 91.exe 55 PID 1396 wrote to memory of 996 1396 91.exe 55 PID 1396 wrote to memory of 996 1396 91.exe 55 PID 1396 wrote to memory of 1740 1396 91.exe 57 PID 1396 wrote to memory of 1740 1396 91.exe 57 PID 1396 wrote to memory of 1740 1396 91.exe 57 PID 1396 wrote to memory of 1740 1396 91.exe 57 PID 1396 wrote to memory of 1996 1396 91.exe 58 PID 1396 wrote to memory of 1996 1396 91.exe 58 PID 1396 wrote to memory of 1996 1396 91.exe 58 PID 1396 wrote to memory of 1996 1396 91.exe 58 PID 996 wrote to memory of 1456 996 cmd.exe 61 PID 996 wrote to memory of 1456 996 cmd.exe 61 PID 996 wrote to memory of 1456 996 cmd.exe 61 PID 996 wrote to memory of 1456 996 cmd.exe 61 PID 1740 wrote to memory of 1436 1740 cmd.exe 62 PID 1740 wrote to memory of 1436 1740 cmd.exe 62 PID 1740 wrote to memory of 1436 1740 cmd.exe 62 PID 1740 wrote to memory of 1436 1740 cmd.exe 62 PID 1396 wrote to memory of 1896 1396 91.exe 63 PID 1396 wrote to memory of 1896 1396 91.exe 63 PID 1396 wrote to memory of 1896 1396 91.exe 63 PID 1396 wrote to memory of 1896 1396 91.exe 63 PID 1396 wrote to memory of 1308 1396 91.exe 65
Processes
-
C:\Users\Admin\AppData\Local\Temp\___________.exe"C:\Users\Admin\AppData\Local\Temp\___________.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
\??\c:\windows\system32\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\gcccwpi4.inf2⤵PID:2044
-
-
C:\Windows\system32\cmd.execmd /c start C:\Windows\temp\3dcgfq5j.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\temp\3dcgfq5j.exeC:\Windows\temp\3dcgfq5j.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\91.exe"C:\Users\Admin\AppData\Roaming\91.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet4⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete4⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet4⤵PID:1980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet4⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete4⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet4⤵PID:1996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet4⤵PID:1896
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete4⤵PID:1308
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:1792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet4⤵PID:876
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"4⤵
- Modifies Internet Explorer settings
PID:976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Roaming\91.exe"4⤵PID:508
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 15⤵PID:1976
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "C:\Windows\temp\3dcgfq5j.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 14⤵PID:1732
-
-
-
-
C:\Windows\system32\taskkill.exetaskkill /IM cmstp.exe /F1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1180