Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
14-04-2021 11:01
Static task
static1
Behavioral task
behavioral1
Sample
b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe
Resource
win10v20210408
General
-
Target
b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe
-
Size
169KB
-
MD5
98562209465bec53327e65649a2b8829
-
SHA1
3a47656ed3df213bd934aa01078a863568fe9f2b
-
SHA256
b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe
-
SHA512
c11ce14f9cb75df2bc9bd81971c1f8fa885815715f389eb8e796e0f657de59756b36a6f896c216a03c7be7bb3ddff9b8a47aee71146760e4f4d9c6bdc0ff2cc3
Malware Config
Extracted
C:\Users\Admin\Desktop\!!Read_Me.C722E.html
dayt0na@tutanota.com
daytona@cock.lu
potts@secmail.pro
http://wobpitin77vdsdiswr43duntv6eqw4rvphedutpaxycjdie6gg3binad.onion
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 1072 bcdedit.exe 800 bcdedit.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exedescription ioc process File renamed C:\Users\Admin\Pictures\RequestApprove.crw => C:\Users\Admin\Pictures\RequestApprove.crw.C722E.thor b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe File renamed C:\Users\Admin\Pictures\OptimizeFormat.tif => C:\Users\Admin\Pictures\OptimizeFormat.tif.C722E.thor b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe File opened for modification C:\Users\Admin\Pictures\TraceRevoke.tiff b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe File renamed C:\Users\Admin\Pictures\TraceRevoke.tiff => C:\Users\Admin\Pictures\TraceRevoke.tiff.C722E.thor b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2860 cmd.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1800 vssadmin.exe -
Kills process with taskkill 13 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2184 taskkill.exe 2220 taskkill.exe 1640 taskkill.exe 2176 taskkill.exe 2192 taskkill.exe 2200 taskkill.exe 2228 taskkill.exe 2248 taskkill.exe 2236 taskkill.exe 844 taskkill.exe 1748 taskkill.exe 1424 taskkill.exe 2100 taskkill.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000051618adbbbd0f84eb34ff59fe7045e8f00000000020000000000106600000001000020000000d2e9cb4394b3e750aabbe7dff51e827d167b28c76d4f17d57515938b7c6a444c000000000e800000000200002000000021882d197cee3a80b2a6bb761c9d1e1c8d0aef77c73749d854ae6bc280425d03200000008c991d2fe8d87c76be462f3882cf5b355c89adeb4fe5768a61907558d787f5b940000000680b6546024e0e771b104eab61962a6cdf9635b90ebfc3495b85c7b6650d7b5eefe0457872a1ec42ab4c0c0efa63fa2f0897be4a4c74f3a76e483e98579a7383 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "325163309" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53A775A1-9D11-11EB-B48A-CE27FB294EC3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3013ee281e31d701 iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 56 IoCs
Processes:
WMIC.exevssvc.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeIncreaseQuotaPrivilege 856 WMIC.exe Token: SeSecurityPrivilege 856 WMIC.exe Token: SeTakeOwnershipPrivilege 856 WMIC.exe Token: SeLoadDriverPrivilege 856 WMIC.exe Token: SeSystemProfilePrivilege 856 WMIC.exe Token: SeSystemtimePrivilege 856 WMIC.exe Token: SeProfSingleProcessPrivilege 856 WMIC.exe Token: SeIncBasePriorityPrivilege 856 WMIC.exe Token: SeCreatePagefilePrivilege 856 WMIC.exe Token: SeBackupPrivilege 856 WMIC.exe Token: SeRestorePrivilege 856 WMIC.exe Token: SeShutdownPrivilege 856 WMIC.exe Token: SeDebugPrivilege 856 WMIC.exe Token: SeSystemEnvironmentPrivilege 856 WMIC.exe Token: SeRemoteShutdownPrivilege 856 WMIC.exe Token: SeUndockPrivilege 856 WMIC.exe Token: SeManageVolumePrivilege 856 WMIC.exe Token: 33 856 WMIC.exe Token: 34 856 WMIC.exe Token: 35 856 WMIC.exe Token: SeBackupPrivilege 428 vssvc.exe Token: SeRestorePrivilege 428 vssvc.exe Token: SeAuditPrivilege 428 vssvc.exe Token: SeIncreaseQuotaPrivilege 856 WMIC.exe Token: SeSecurityPrivilege 856 WMIC.exe Token: SeTakeOwnershipPrivilege 856 WMIC.exe Token: SeLoadDriverPrivilege 856 WMIC.exe Token: SeSystemProfilePrivilege 856 WMIC.exe Token: SeSystemtimePrivilege 856 WMIC.exe Token: SeProfSingleProcessPrivilege 856 WMIC.exe Token: SeIncBasePriorityPrivilege 856 WMIC.exe Token: SeCreatePagefilePrivilege 856 WMIC.exe Token: SeBackupPrivilege 856 WMIC.exe Token: SeRestorePrivilege 856 WMIC.exe Token: SeShutdownPrivilege 856 WMIC.exe Token: SeDebugPrivilege 856 WMIC.exe Token: SeSystemEnvironmentPrivilege 856 WMIC.exe Token: SeRemoteShutdownPrivilege 856 WMIC.exe Token: SeUndockPrivilege 856 WMIC.exe Token: SeManageVolumePrivilege 856 WMIC.exe Token: 33 856 WMIC.exe Token: 34 856 WMIC.exe Token: 35 856 WMIC.exe Token: SeDebugPrivilege 844 taskkill.exe Token: SeDebugPrivilege 1748 taskkill.exe Token: SeDebugPrivilege 1640 taskkill.exe Token: SeDebugPrivilege 1424 taskkill.exe Token: SeDebugPrivilege 2100 taskkill.exe Token: SeDebugPrivilege 2200 taskkill.exe Token: SeDebugPrivilege 2248 taskkill.exe Token: SeDebugPrivilege 2220 taskkill.exe Token: SeDebugPrivilege 2236 taskkill.exe Token: SeDebugPrivilege 2228 taskkill.exe Token: SeDebugPrivilege 2176 taskkill.exe Token: SeDebugPrivilege 2184 taskkill.exe Token: SeDebugPrivilege 2192 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2644 iexplore.exe 2644 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2016 wrote to memory of 1176 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1176 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1176 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1176 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1940 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1940 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1940 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1940 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1612 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1612 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1612 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1612 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1776 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1776 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1776 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1776 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1696 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1696 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1696 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1696 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 1940 wrote to memory of 856 1940 cmd.exe WMIC.exe PID 1940 wrote to memory of 856 1940 cmd.exe WMIC.exe PID 1940 wrote to memory of 856 1940 cmd.exe WMIC.exe PID 1612 wrote to memory of 1072 1612 cmd.exe bcdedit.exe PID 1612 wrote to memory of 1072 1612 cmd.exe bcdedit.exe PID 1612 wrote to memory of 1072 1612 cmd.exe bcdedit.exe PID 1696 wrote to memory of 528 1696 cmd.exe netsh.exe PID 1696 wrote to memory of 528 1696 cmd.exe netsh.exe PID 1696 wrote to memory of 528 1696 cmd.exe netsh.exe PID 1176 wrote to memory of 1800 1176 cmd.exe vssadmin.exe PID 1176 wrote to memory of 1800 1176 cmd.exe vssadmin.exe PID 1176 wrote to memory of 1800 1176 cmd.exe vssadmin.exe PID 1776 wrote to memory of 800 1776 cmd.exe bcdedit.exe PID 1776 wrote to memory of 800 1776 cmd.exe bcdedit.exe PID 1776 wrote to memory of 800 1776 cmd.exe bcdedit.exe PID 2016 wrote to memory of 1828 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1828 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1828 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1828 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1628 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1628 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1628 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1628 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 1828 wrote to memory of 844 1828 cmd.exe taskkill.exe PID 1828 wrote to memory of 844 1828 cmd.exe taskkill.exe PID 1828 wrote to memory of 844 1828 cmd.exe taskkill.exe PID 1828 wrote to memory of 844 1828 cmd.exe taskkill.exe PID 2016 wrote to memory of 788 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 788 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 788 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 788 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1392 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1392 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1392 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1392 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 216 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 216 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 216 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 216 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 228 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 228 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 228 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 228 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe PID 2016 wrote to memory of 1608 2016 b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe"C:\Users\Admin\AppData\Local\Temp\b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe"1⤵
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c vssadmin delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.execmd.exe /c wmic shadowcopy delete /nointeractive2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd.exe /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\cmd.execmd.exe /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\cmd.execmd.exe /c netsh advfirewall set allprofiles state off2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state off3⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im note*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im note*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im powerpnt*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im powerpnt*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im winword*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im winword*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im excel*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im excel*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im Exchange*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Exchange*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im sql*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sql*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im tomcat*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tomcat*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im apache*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im apache*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im python*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im python*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im vee*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im vee*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im post*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im post*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im mys*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mys*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im java*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im java*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1>nul & del /q C:\Users\Admin\AppData\Local\Temp\b5466ce462df16b3a29f22192b1291d70479cacf35bd5e937f35b2567da948fe.exe2⤵
- Deletes itself
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\!!Read_Me.C722E.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0X0PXXYX.txtMD5
b620604399e019028c0ed090313cea09
SHA1316ea69bc58d0b73dcc488b19740c8c7a31a033c
SHA256525f91abc48c96c427269972f2d7cd11400ae52bb398173c04ad10eadbae31b7
SHA512bcd6b76af2f442a3acf0e52d3d54711a2e381b2606b314a8b1ac203bdeaffdc1f9cc55de57229a04c58159f9732b2b72bd33471d9c42a8eecfa5c1daa75d053f
-
C:\Users\Admin\Desktop\!!Read_Me.C722E.htmlMD5
8d46bf069f39590d570f0e24c8946306
SHA10cfa451b6b6d3e998788aecf59015c6823c9dbf2
SHA2561a248666c48bd31622ceead6bc07a7f513aee331f04eee723729aee2de9593d9
SHA512df0dc51256b7520a94c556a1ece9dcf3117506a0e65c45a9225853357fbec4a99a5521fed11e27585e9996c3711a4163f27ba5293bb2adc5689819a943e6a1c2
-
memory/216-77-0x0000000000000000-mapping.dmp
-
memory/228-78-0x0000000000000000-mapping.dmp
-
memory/528-68-0x0000000000000000-mapping.dmp
-
memory/528-71-0x000007FEFB931000-0x000007FEFB933000-memory.dmpFilesize
8KB
-
memory/788-75-0x0000000000000000-mapping.dmp
-
memory/800-70-0x0000000000000000-mapping.dmp
-
memory/844-74-0x0000000000000000-mapping.dmp
-
memory/856-66-0x0000000000000000-mapping.dmp
-
memory/1072-67-0x0000000000000000-mapping.dmp
-
memory/1176-61-0x0000000000000000-mapping.dmp
-
memory/1392-76-0x0000000000000000-mapping.dmp
-
memory/1424-85-0x0000000000000000-mapping.dmp
-
memory/1492-84-0x0000000000000000-mapping.dmp
-
memory/1540-83-0x0000000000000000-mapping.dmp
-
memory/1608-79-0x0000000000000000-mapping.dmp
-
memory/1612-63-0x0000000000000000-mapping.dmp
-
memory/1628-73-0x0000000000000000-mapping.dmp
-
memory/1640-86-0x0000000000000000-mapping.dmp
-
memory/1696-65-0x0000000000000000-mapping.dmp
-
memory/1748-82-0x0000000000000000-mapping.dmp
-
memory/1764-81-0x0000000000000000-mapping.dmp
-
memory/1776-64-0x0000000000000000-mapping.dmp
-
memory/1800-69-0x0000000000000000-mapping.dmp
-
memory/1812-80-0x0000000000000000-mapping.dmp
-
memory/1828-72-0x0000000000000000-mapping.dmp
-
memory/1940-62-0x0000000000000000-mapping.dmp
-
memory/2016-59-0x0000000010000000-0x000000001001C000-memory.dmpFilesize
112KB
-
memory/2060-87-0x0000000000000000-mapping.dmp
-
memory/2088-88-0x0000000000000000-mapping.dmp
-
memory/2100-89-0x0000000000000000-mapping.dmp
-
memory/2176-92-0x0000000000000000-mapping.dmp
-
memory/2184-96-0x0000000000000000-mapping.dmp
-
memory/2192-97-0x0000000000000000-mapping.dmp
-
memory/2200-91-0x0000000000000000-mapping.dmp
-
memory/2220-90-0x0000000000000000-mapping.dmp
-
memory/2228-93-0x0000000000000000-mapping.dmp
-
memory/2236-94-0x0000000000000000-mapping.dmp
-
memory/2248-95-0x0000000000000000-mapping.dmp
-
memory/2748-100-0x0000000075D41000-0x0000000075D43000-memory.dmpFilesize
8KB
-
memory/2748-101-0x0000000000620000-0x0000000000622000-memory.dmpFilesize
8KB
-
memory/2748-99-0x0000000000000000-mapping.dmp
-
memory/2860-103-0x0000000000000000-mapping.dmp
-
memory/2888-104-0x0000000000000000-mapping.dmp