Analysis
-
max time kernel
138s -
max time network
172s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 12:57
Static task
static1
Behavioral task
behavioral1
Sample
392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe
Resource
win10v20210410
General
-
Target
392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe
-
Size
125KB
-
MD5
c4472cd02b1396ca49935f029db6a8ec
-
SHA1
fa4891fc8416a191d255fc186ef534d022d665e2
-
SHA256
392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270
-
SHA512
4a7463bc0a6a88d6eb7b2964b6212429ae8a7cd5f02abda2ecabecb1b2b374419fc48c4124386bdf184cef6f27ede998d245c3a0dbb97050e1639c7fb1a37ce5
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.onion.to/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.onion.cab/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.onion.nu/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.onion.link/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.tor2web.org/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.onion/AA89-A485-DC83-0006-4055
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.onion.to/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.onion.cab/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.onion.nu/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.onion.link/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.tor2web.org/AA89-A485-DC83-0006-4055
http://cerberhhyed5frqa.onion/AA89-A485-DC83-0006-4055
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
suricata: ET MALWARE Ransomware/Cerber Checkin 2
-
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (11)
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\\netbtugc.exe\"" 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\\netbtugc.exe\"" netbtugc.exe -
Executes dropped EXE 3 IoCs
pid Process 1280 netbtugc.exe 1752 netbtugc.exe 1708 netbtugc.exe -
Deletes itself 1 IoCs
pid Process 1604 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\netbtugc.lnk netbtugc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\netbtugc.lnk 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe -
Loads dropped DLL 3 IoCs
pid Process 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 1280 netbtugc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\netbtugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\\netbtugc.exe\"" 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run netbtugc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\netbtugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\\netbtugc.exe\"" netbtugc.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce netbtugc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\netbtugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\\netbtugc.exe\"" netbtugc.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\netbtugc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\\netbtugc.exe\"" 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA netbtugc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpA026.bmp" netbtugc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 1544 taskkill.exe 2288 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\\netbtugc.exe\"" 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop netbtugc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\\netbtugc.exe\"" netbtugc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2793DFD1-EE15-11EB-A1A8-4E3F7CC12DEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002521c7600145884f842cd3bc0fbb787000000000020000000000106600000001000020000000c79342e893200f382b3e9a4a1358b900fe863841dff6bc21659208dbc2c02d2a000000000e8000000002000020000000c48ba181aabd738740d63c9bd3274923f7242cf2c6326adb927146cb459b47a620000000e1219220bd5ce075c344566863b062bbb569181a2ecc364a1ac1ea9fade1b27d40000000d36822cbcad1542b9f7b0d68146bcb898063c547e45271977169281195c6a83006ff6c507bd52afcd60c984d705315b29046a9a4bf852854666ba019d1d7dcfa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27D8E7B1-EE15-11EB-A1A8-4E3F7CC12DEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "334070994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508b4cec2182d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1808 PING.EXE 2332 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe 1280 netbtugc.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe Token: SeDebugPrivilege 1280 netbtugc.exe Token: SeDebugPrivilege 1544 taskkill.exe Token: SeDebugPrivilege 1752 netbtugc.exe Token: SeDebugPrivilege 1708 netbtugc.exe Token: 33 2052 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2052 AUDIODG.EXE Token: 33 2052 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2052 AUDIODG.EXE Token: SeDebugPrivilege 2288 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1680 iexplore.exe 1284 iexplore.exe 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 1680 iexplore.exe 1680 iexplore.exe 1284 iexplore.exe 1284 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 284 IEXPLORE.EXE 284 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1280 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 29 PID 1660 wrote to memory of 1280 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 29 PID 1660 wrote to memory of 1280 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 29 PID 1660 wrote to memory of 1280 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 29 PID 1660 wrote to memory of 1604 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 30 PID 1660 wrote to memory of 1604 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 30 PID 1660 wrote to memory of 1604 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 30 PID 1660 wrote to memory of 1604 1660 392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe 30 PID 1604 wrote to memory of 1544 1604 cmd.exe 32 PID 1604 wrote to memory of 1544 1604 cmd.exe 32 PID 1604 wrote to memory of 1544 1604 cmd.exe 32 PID 1604 wrote to memory of 1544 1604 cmd.exe 32 PID 1604 wrote to memory of 1808 1604 cmd.exe 35 PID 1604 wrote to memory of 1808 1604 cmd.exe 35 PID 1604 wrote to memory of 1808 1604 cmd.exe 35 PID 1604 wrote to memory of 1808 1604 cmd.exe 35 PID 1568 wrote to memory of 1752 1568 taskeng.exe 38 PID 1568 wrote to memory of 1752 1568 taskeng.exe 38 PID 1568 wrote to memory of 1752 1568 taskeng.exe 38 PID 1568 wrote to memory of 1752 1568 taskeng.exe 38 PID 1280 wrote to memory of 1680 1280 netbtugc.exe 40 PID 1280 wrote to memory of 1680 1280 netbtugc.exe 40 PID 1280 wrote to memory of 1680 1280 netbtugc.exe 40 PID 1280 wrote to memory of 1680 1280 netbtugc.exe 40 PID 1280 wrote to memory of 968 1280 netbtugc.exe 41 PID 1280 wrote to memory of 968 1280 netbtugc.exe 41 PID 1280 wrote to memory of 968 1280 netbtugc.exe 41 PID 1280 wrote to memory of 968 1280 netbtugc.exe 41 PID 1568 wrote to memory of 1708 1568 taskeng.exe 42 PID 1568 wrote to memory of 1708 1568 taskeng.exe 42 PID 1568 wrote to memory of 1708 1568 taskeng.exe 42 PID 1568 wrote to memory of 1708 1568 taskeng.exe 42 PID 1680 wrote to memory of 1688 1680 iexplore.exe 43 PID 1680 wrote to memory of 1688 1680 iexplore.exe 43 PID 1680 wrote to memory of 1688 1680 iexplore.exe 43 PID 1680 wrote to memory of 1688 1680 iexplore.exe 43 PID 1284 wrote to memory of 284 1284 iexplore.exe 45 PID 1284 wrote to memory of 284 1284 iexplore.exe 45 PID 1284 wrote to memory of 284 1284 iexplore.exe 45 PID 1284 wrote to memory of 284 1284 iexplore.exe 45 PID 1280 wrote to memory of 596 1280 netbtugc.exe 46 PID 1280 wrote to memory of 596 1280 netbtugc.exe 46 PID 1280 wrote to memory of 596 1280 netbtugc.exe 46 PID 1280 wrote to memory of 596 1280 netbtugc.exe 46 PID 1280 wrote to memory of 2252 1280 netbtugc.exe 50 PID 1280 wrote to memory of 2252 1280 netbtugc.exe 50 PID 1280 wrote to memory of 2252 1280 netbtugc.exe 50 PID 1280 wrote to memory of 2252 1280 netbtugc.exe 50 PID 2252 wrote to memory of 2288 2252 cmd.exe 52 PID 2252 wrote to memory of 2288 2252 cmd.exe 52 PID 2252 wrote to memory of 2288 2252 cmd.exe 52 PID 2252 wrote to memory of 2332 2252 cmd.exe 53 PID 2252 wrote to memory of 2332 2252 cmd.exe 53 PID 2252 wrote to memory of 2332 2252 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe"C:\Users\Admin\AppData\Local\Temp\392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\netbtugc.exe"C:\Users\Admin\AppData\Roaming\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\netbtugc.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:968
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:596
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "netbtugc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\netbtugc.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "netbtugc.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2332
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "392e471bab3700300378fd83bc108576acb6246f19c502972c00ddb4b9bac270.sample.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:1808
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {798E8EE4-CE89-484A-85CE-128FA6F0A739} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\netbtugc.exeC:\Users\Admin\AppData\Roaming\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\netbtugc.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Users\Admin\AppData\Roaming\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\netbtugc.exeC:\Users\Admin\AppData\Roaming\{F7A21D6E-5744-E3E1-1E0E-7FCE223524B1}\netbtugc.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:284
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1736
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1ac1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2052