Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 13:00
Static task
static1
Behavioral task
behavioral1
Sample
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe
Resource
win10v20210408
General
-
Target
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe
-
Size
854KB
-
MD5
1e27184759cc4099c0da73b152408281
-
SHA1
cf71196d88354a8324fdaa12013a4d80aa3b7c55
-
SHA256
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec
-
SHA512
f74da0c39a57b612c1e7cc3c6079b3ddd1f3393728ad4e375e5bb116229d66db2811e948008447a29c1c738cf9a707b5e8d4c8ec69cccf47af2e4c8d2373e5cf
Malware Config
Extracted
C:\README1.txt
VladimirScherbinin1991@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\RemoveStart.tiff 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe -
Processes:
resource yara_rule behavioral1/memory/1972-61-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral1/memory/1972-64-0x0000000000400000-0x00000000005D5000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 12 IoCs
Processes:
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exedescription ioc process File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 whatismyipaddress.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\773B6FC6773B6FC6.bmp" 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exedescription pid process target process PID 2000 set thread context of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe -
Drops file in Program Files directory 64 IoCs
Processes:
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exedescription ioc process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waning-gibbous_partly-cloudy.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_divider_left.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\THANKS.txt 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\1047x576_91n92.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\Panel_Mask_PAL.wmv 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\blackbars60.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\15x15dot.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\eclipse_update_120.jpg 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_ButtonGraphic.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)redStateIcon.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-full_partly-cloudy.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mousedown.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_dot.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\batch_window.html 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\navSubpicture.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Mozilla Firefox\update-settings.ini 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\43.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\7.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_divider_right.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_globalstyle.css 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\1047x576black.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-highlight.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\27.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\logo.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_left_mouseout.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\back.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\vlc-48.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jre7\bin\server\Xusage.txt 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_WMC_LogoText.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\icon.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\curl-hot.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_config_window.html 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\FrameworkList.xml 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\Logo.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\combo-hover-right.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\drag.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_settings.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-services.xml 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\new-trigger-wiz.gif 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\feature.xml 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_s.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-ui.xml 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\toc.gif 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_70.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-heapdump.xml 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_SelectionSubpicture.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\TitleButtonIcon.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_ButtonGraphic.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-heapwalker.xml 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\content-background.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_SelectionSubpicture.png 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\default_thumb.jpg 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1896 1256 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exeWerFault.exepid process 1972 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 1972 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 1896 WerFault.exe 1896 WerFault.exe 1896 WerFault.exe 1896 WerFault.exe 1896 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1896 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1896 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exepid process 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exedescription pid process target process PID 2000 wrote to memory of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe PID 2000 wrote to memory of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe PID 2000 wrote to memory of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe PID 2000 wrote to memory of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe PID 2000 wrote to memory of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe PID 2000 wrote to memory of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe PID 2000 wrote to memory of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe PID 2000 wrote to memory of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe PID 2000 wrote to memory of 1972 2000 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe 9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe"C:\Users\Admin\AppData\Local\Temp\9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe"C:\Users\Admin\AppData\Local\Temp\9695fc65d51d6045eb80bbda94d1971934f96f0641ad2ee260b0a26d124edaec.sample.exe"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1256 -s 30001⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1896-65-0x000007FEFC411000-0x000007FEFC413000-memory.dmpFilesize
8KB
-
memory/1896-66-0x0000000002340000-0x0000000002341000-memory.dmpFilesize
4KB
-
memory/1972-61-0x0000000000400000-0x00000000005D5000-memory.dmpFilesize
1.8MB
-
memory/1972-62-0x00000000005D2A80-mapping.dmp
-
memory/1972-63-0x00000000765F1000-0x00000000765F3000-memory.dmpFilesize
8KB
-
memory/1972-64-0x0000000000400000-0x00000000005D5000-memory.dmpFilesize
1.8MB