Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-08-2021 01:11
Static task
static1
Behavioral task
behavioral1
Sample
5b9805d7b48c07d06c115c68f6453126.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
5b9805d7b48c07d06c115c68f6453126.exe
Resource
win10v20210408
General
-
Target
5b9805d7b48c07d06c115c68f6453126.exe
-
Size
142KB
-
MD5
5b9805d7b48c07d06c115c68f6453126
-
SHA1
5d9fd16789e50eeb8dde5cfe06562328ae1620e2
-
SHA256
5739ea70dbe1a9d014b42300149b2ccbcf628cf08af00053708003caf3bbc14d
-
SHA512
2e19f2979ebea298e526586cd858f1da2ba19ef0a3903244f6dcd930cc478b5034014fb4d9df3f568eb04fdb8a6329847609834ec330002728ea1858fd7528c2
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
redline
WORD1
94.26.249.88:1902
Extracted
raccoon
20d9c80657d1d0fda9625cbd629ba419b8a34404
-
url4cnc
https://telete.in/hfuimoneymake
Extracted
redline
nn
135.181.49.56:47634
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Extracted
redline
1000
94.103.9.138:80
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/3832-142-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/3832-144-0x000000000041A68E-mapping.dmp family_redline behavioral2/memory/4148-211-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/4148-213-0x000000000041C5C6-mapping.dmp family_redline behavioral2/files/0x000100000001ab59-482.dat family_redline behavioral2/files/0x000100000001ab59-486.dat family_redline behavioral2/memory/4472-518-0x0000000005090000-0x000000000558E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty Payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000001ab58-469.dat family_stormkitty behavioral2/files/0x000100000001ab58-470.dat family_stormkitty -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid Process procid_target PID 5084 created 3872 5084 WerFault.exe 79 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
suricata: ET MALWARE StormKitty Data Exfil via Telegram
suricata: ET MALWARE StormKitty Data Exfil via Telegram
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000001ab58-469.dat asyncrat behavioral2/files/0x000100000001ab58-470.dat asyncrat -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000001ab4b-177.dat Nirsoft behavioral2/files/0x000100000001ab4b-178.dat Nirsoft behavioral2/files/0x000100000001ab4b-185.dat Nirsoft -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
Processes:
B99.exeC94.exe12A0.exe1FA1.exe25CD.exeAdvancedRun.exe334B.exeAdvancedRun.exe34E2.exe36E7.exeFineeest_.exePryntVirus.exe1000 hq.exehdwsubehdwsubepid Process 3872 B99.exe 2772 C94.exe 1540 12A0.exe 488 1FA1.exe 4000 25CD.exe 2012 AdvancedRun.exe 3704 334B.exe 3572 AdvancedRun.exe 416 34E2.exe 3696 36E7.exe 1084 Fineeest_.exe 2100 PryntVirus.exe 4472 1000 hq.exe 4236 hdwsube 4976 hdwsube -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
12A0.exe1FA1.exeFineeest_.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 12A0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1FA1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1FA1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fineeest_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fineeest_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 12A0.exe -
Deletes itself 1 IoCs
Processes:
pid Process 3020 -
Loads dropped DLL 1 IoCs
Processes:
B99.exepid Process 3872 B99.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/files/0x000200000001ab46-127.dat themida behavioral2/files/0x000200000001ab46-128.dat themida behavioral2/memory/1540-131-0x0000000000250000-0x0000000000251000-memory.dmp themida behavioral2/files/0x000200000001ab47-143.dat themida behavioral2/files/0x000200000001ab47-149.dat themida behavioral2/memory/488-159-0x0000000000CF0000-0x0000000000CF1000-memory.dmp themida behavioral2/files/0x000100000001ab57-464.dat themida behavioral2/files/0x000100000001ab57-479.dat themida -
Processes:
25CD.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 25CD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 25CD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 25CD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 25CD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 25CD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\25CD.exe = "0" 25CD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 25CD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 25CD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 25CD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 25CD.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
34E2.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run 34E2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskeng.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\taskeng.exe\" -start" 34E2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
25CD.exeFineeest_.exe12A0.exe1FA1.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 25CD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25CD.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Fineeest_.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 12A0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1FA1.exe -
Drops desktop.ini file(s) 7 IoCs
Processes:
PryntVirus.exedescription ioc Process File created C:\Users\Admin\AppData\Local\2d08a6d8b61b61223fc2b1f04f3d4455\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini PryntVirus.exe File opened for modification C:\Users\Admin\AppData\Local\2d08a6d8b61b61223fc2b1f04f3d4455\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\2d08a6d8b61b61223fc2b1f04f3d4455\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\2d08a6d8b61b61223fc2b1f04f3d4455\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\2d08a6d8b61b61223fc2b1f04f3d4455\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\2d08a6d8b61b61223fc2b1f04f3d4455\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini PryntVirus.exe File created C:\Users\Admin\AppData\Local\2d08a6d8b61b61223fc2b1f04f3d4455\Admin@GFBFPSXA_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini PryntVirus.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
taskeng.exedescription ioc Process File opened (read-only) \??\Z: taskeng.exe File opened (read-only) \??\T: taskeng.exe File opened (read-only) \??\P: taskeng.exe File opened (read-only) \??\I: taskeng.exe File opened (read-only) \??\Y: taskeng.exe File opened (read-only) \??\U: taskeng.exe File opened (read-only) \??\S: taskeng.exe File opened (read-only) \??\R: taskeng.exe File opened (read-only) \??\Q: taskeng.exe File opened (read-only) \??\O: taskeng.exe File opened (read-only) \??\M: taskeng.exe File opened (read-only) \??\G: taskeng.exe File opened (read-only) \??\V: taskeng.exe File opened (read-only) \??\N: taskeng.exe File opened (read-only) \??\H: taskeng.exe File opened (read-only) \??\E: taskeng.exe File opened (read-only) \??\A: taskeng.exe File opened (read-only) \??\X: taskeng.exe File opened (read-only) \??\W: taskeng.exe File opened (read-only) \??\L: taskeng.exe File opened (read-only) \??\K: taskeng.exe File opened (read-only) \??\J: taskeng.exe File opened (read-only) \??\F: taskeng.exe File opened (read-only) \??\B: taskeng.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 33 geoiptool.com 72 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
12A0.exe1FA1.exeFineeest_.exepid Process 1540 12A0.exe 488 1FA1.exe 1084 Fineeest_.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
5b9805d7b48c07d06c115c68f6453126.exeC94.exe25CD.exehdwsubedescription pid Process procid_target PID 992 set thread context of 800 992 5b9805d7b48c07d06c115c68f6453126.exe 77 PID 2772 set thread context of 3832 2772 C94.exe 84 PID 4000 set thread context of 4148 4000 25CD.exe 110 PID 4236 set thread context of 4976 4236 hdwsube 164 -
Drops file in Program Files directory 64 IoCs
Processes:
taskeng.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_zh_4.4.0.v20140623020002.jar.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\etc\visualvm.conf.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ul-phn.xrm-ms taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\WATER\PREVIEW.GIF taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNotePageMedTile.scale-200.png taskeng.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PAPYRUS\THMBNAIL.PNG.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Assets\Audio\incoming_im.wav taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxCalendarMediumTile.scale-200.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\ExchangeWideTile.scale-150.png taskeng.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\WinStore.App.exe taskeng.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\ODBC\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\PopUp\Pop_up_Question.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\offsyml.ttf taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\1725_40x40x32.png taskeng.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\MS.Entertainment.Common\Resources\Fonts\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Grace-ppd.xrm-ms.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SUMIPNTG\SUMIPNTG.ELM taskeng.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\ProductCascadeJDA27ptsWithLbfLowend.mdl taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_pt_BR.jar.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.16112.11621.0_neutral_resources.scale-200_8wekyb3d8bbwe\Assets\contrast-white\LargeLogo.scale-200_contrast-white.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Awards\freecell\Guard_Duty_.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_Square.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\4642_32x32x32.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-white_scale-200.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\Assets\notification.send.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\_Resources\index.txt taskeng.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_16.511.8780.0_neutral_split.scale-100_8wekyb3d8bbwe\Lumia.ViewerPlugin\Assets\IconEditMoment.contrast-high_scale-100.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\AppPackageSmallTile.scale-100_contrast-black.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-30_altform-fullcolor.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\MedTile.scale-100.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-80_altform-unplated.png taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019DemoR_BypassTrial180-ul-oob.xrm-ms.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Violet II.xml.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Buttons\GiveUp\GiveUp-press.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_targetsize-20_altform-unplated.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreAppList.targetsize-36.png taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe taskeng.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_11.8.204.0_neutral_split.scale-125_kzf8qxf38zg5c\SkypeApp\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT taskeng.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\LargeTile.scale-125.png taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-180.png.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\Assets\starttile.wink.small.scale-200.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\ir_60x42.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_1.0.45.0_x64__8wekyb3d8bbwe\PurchaseApp.exe taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-96.png taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler_zh_CN.jar taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription3-ul-oob.xrm-ms.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL108.XML.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Awards\challenge\Gimme_Five_Unearned_small.png taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-snaptracer_ja.jar taskeng.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\sandbox.luac.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.16112.11621.0_neutral_resources.scale-150_8wekyb3d8bbwe\Assets\contrast-white\Logo.scale-150_contrast-white.png taskeng.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\officemuiset.msi.16.en-us.boot.tree.dat.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\manifestAssets\contrast-black\Square44x44Logo.scale-100.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\OneConnectMedTile.scale-100.png taskeng.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\6440_48x48x32.png taskeng.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Scan_R_RHP.aapp.payfast290.CDE-F5C-613 taskeng.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-text.xml taskeng.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2340 3872 WerFault.exe 79 1496 3872 WerFault.exe 79 2652 3872 WerFault.exe 79 2888 3872 WerFault.exe 79 1272 3872 WerFault.exe 79 1052 3872 WerFault.exe 79 4240 3872 WerFault.exe 79 4456 3872 WerFault.exe 79 4696 3872 WerFault.exe 79 4828 3872 WerFault.exe 79 4912 3872 WerFault.exe 79 5000 3872 WerFault.exe 79 5084 3872 WerFault.exe 79 1540 3928 WerFault.exe 108 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
hdwsube5b9805d7b48c07d06c115c68f6453126.exedescription ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hdwsube Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hdwsube Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b9805d7b48c07d06c115c68f6453126.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b9805d7b48c07d06c115c68f6453126.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5b9805d7b48c07d06c115c68f6453126.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hdwsube -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
PryntVirus.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 PryntVirus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier PryntVirus.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 1532 vssadmin.exe 4732 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5b9805d7b48c07d06c115c68f6453126.exepid Process 800 5b9805d7b48c07d06c115c68f6453126.exe 800 5b9805d7b48c07d06c115c68f6453126.exe 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 3020 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
5b9805d7b48c07d06c115c68f6453126.exepid Process 800 5b9805d7b48c07d06c115c68f6453126.exe 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
C94.exeWerFault.exeAdvancedRun.exeAdvancedRun.exeWerFault.exepowershell.exepowershell.exe12A0.exeWerFault.exeWerFault.exe1FA1.exe25CD.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeaspnet_compiler.exeWerFault.exeWerFault.exeFineeest_.exeWMIC.exedescription pid Process Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeDebugPrivilege 2772 C94.exe Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeRestorePrivilege 2340 WerFault.exe Token: SeBackupPrivilege 2340 WerFault.exe Token: SeDebugPrivilege 2012 AdvancedRun.exe Token: SeImpersonatePrivilege 2012 AdvancedRun.exe Token: SeDebugPrivilege 3572 AdvancedRun.exe Token: SeImpersonatePrivilege 3572 AdvancedRun.exe Token: SeDebugPrivilege 2340 WerFault.exe Token: SeDebugPrivilege 1496 WerFault.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2888 powershell.exe Token: SeDebugPrivilege 1540 12A0.exe Token: SeDebugPrivilege 1272 WerFault.exe Token: SeDebugPrivilege 1052 WerFault.exe Token: SeDebugPrivilege 488 1FA1.exe Token: SeDebugPrivilege 4000 25CD.exe Token: SeDebugPrivilege 4240 WerFault.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2888 powershell.exe Token: SeDebugPrivilege 4456 WerFault.exe Token: SeDebugPrivilege 4696 WerFault.exe Token: SeDebugPrivilege 4828 WerFault.exe Token: SeDebugPrivilege 4912 WerFault.exe Token: SeDebugPrivilege 4148 aspnet_compiler.exe Token: SeDebugPrivilege 5000 WerFault.exe Token: SeDebugPrivilege 5084 WerFault.exe Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeDebugPrivilege 1084 Fineeest_.exe Token: SeIncreaseQuotaPrivilege 4592 WMIC.exe Token: SeSecurityPrivilege 4592 WMIC.exe Token: SeTakeOwnershipPrivilege 4592 WMIC.exe Token: SeLoadDriverPrivilege 4592 WMIC.exe Token: SeSystemProfilePrivilege 4592 WMIC.exe Token: SeSystemtimePrivilege 4592 WMIC.exe Token: SeProfSingleProcessPrivilege 4592 WMIC.exe Token: SeIncBasePriorityPrivilege 4592 WMIC.exe Token: SeCreatePagefilePrivilege 4592 WMIC.exe Token: SeBackupPrivilege 4592 WMIC.exe Token: SeRestorePrivilege 4592 WMIC.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3020 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5b9805d7b48c07d06c115c68f6453126.exeC94.exe25CD.exeAdvancedRun.exedescription pid Process procid_target PID 992 wrote to memory of 800 992 5b9805d7b48c07d06c115c68f6453126.exe 77 PID 992 wrote to memory of 800 992 5b9805d7b48c07d06c115c68f6453126.exe 77 PID 992 wrote to memory of 800 992 5b9805d7b48c07d06c115c68f6453126.exe 77 PID 992 wrote to memory of 800 992 5b9805d7b48c07d06c115c68f6453126.exe 77 PID 992 wrote to memory of 800 992 5b9805d7b48c07d06c115c68f6453126.exe 77 PID 992 wrote to memory of 800 992 5b9805d7b48c07d06c115c68f6453126.exe 77 PID 3020 wrote to memory of 3872 3020 79 PID 3020 wrote to memory of 3872 3020 79 PID 3020 wrote to memory of 3872 3020 79 PID 3020 wrote to memory of 2772 3020 80 PID 3020 wrote to memory of 2772 3020 80 PID 3020 wrote to memory of 2772 3020 80 PID 3020 wrote to memory of 1540 3020 81 PID 3020 wrote to memory of 1540 3020 81 PID 3020 wrote to memory of 1540 3020 81 PID 3020 wrote to memory of 488 3020 83 PID 3020 wrote to memory of 488 3020 83 PID 3020 wrote to memory of 488 3020 83 PID 2772 wrote to memory of 3832 2772 C94.exe 84 PID 2772 wrote to memory of 3832 2772 C94.exe 84 PID 2772 wrote to memory of 3832 2772 C94.exe 84 PID 2772 wrote to memory of 3832 2772 C94.exe 84 PID 2772 wrote to memory of 3832 2772 C94.exe 84 PID 2772 wrote to memory of 3832 2772 C94.exe 84 PID 2772 wrote to memory of 3832 2772 C94.exe 84 PID 2772 wrote to memory of 3832 2772 C94.exe 84 PID 3020 wrote to memory of 4000 3020 87 PID 3020 wrote to memory of 4000 3020 87 PID 3020 wrote to memory of 4000 3020 87 PID 4000 wrote to memory of 2012 4000 25CD.exe 90 PID 4000 wrote to memory of 2012 4000 25CD.exe 90 PID 4000 wrote to memory of 2012 4000 25CD.exe 90 PID 2012 wrote to memory of 3572 2012 AdvancedRun.exe 91 PID 2012 wrote to memory of 3572 2012 AdvancedRun.exe 91 PID 2012 wrote to memory of 3572 2012 AdvancedRun.exe 91 PID 3020 wrote to memory of 3704 3020 92 PID 3020 wrote to memory of 3704 3020 92 PID 3020 wrote to memory of 416 3020 94 PID 3020 wrote to memory of 416 3020 94 PID 3020 wrote to memory of 416 3020 94 PID 3020 wrote to memory of 3696 3020 95 PID 3020 wrote to memory of 3696 3020 95 PID 3020 wrote to memory of 3696 3020 95 PID 3020 wrote to memory of 3928 3020 108 PID 3020 wrote to memory of 3928 3020 108 PID 3020 wrote to memory of 3928 3020 108 PID 3020 wrote to memory of 3928 3020 108 PID 3020 wrote to memory of 3960 3020 100 PID 3020 wrote to memory of 3960 3020 100 PID 3020 wrote to memory of 3960 3020 100 PID 3020 wrote to memory of 2140 3020 102 PID 3020 wrote to memory of 2140 3020 102 PID 3020 wrote to memory of 2140 3020 102 PID 3020 wrote to memory of 2140 3020 102 PID 4000 wrote to memory of 2652 4000 25CD.exe 104 PID 4000 wrote to memory of 2652 4000 25CD.exe 104 PID 4000 wrote to memory of 2652 4000 25CD.exe 104 PID 4000 wrote to memory of 2888 4000 25CD.exe 105 PID 4000 wrote to memory of 2888 4000 25CD.exe 105 PID 4000 wrote to memory of 2888 4000 25CD.exe 105 PID 3020 wrote to memory of 636 3020 112 PID 3020 wrote to memory of 636 3020 112 PID 3020 wrote to memory of 636 3020 112 PID 4000 wrote to memory of 4104 4000 25CD.exe 109 -
System policy modification 1 TTPs 1 IoCs
Processes:
25CD.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 25CD.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"C:\Users\Admin\AppData\Local\Temp\5b9805d7b48c07d06c115c68f6453126.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\B99.exeC:\Users\Admin\AppData\Local\Temp\B99.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 7322⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 7482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 8882⤵
- Program crash
PID:2652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 9082⤵
- Program crash
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 11842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 12202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 12202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 12002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 11522⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 11562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 12242⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 11882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 12322⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\C94.exeC:\Users\Admin\AppData\Local\Temp\C94.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\12A0.exeC:\Users\Admin\AppData\Local\Temp\12A0.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
C:\Users\Admin\AppData\Local\Temp\1FA1.exeC:\Users\Admin\AppData\Local\Temp\1FA1.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:488
-
C:\Users\Admin\AppData\Local\Temp\25CD.exeC:\Users\Admin\AppData\Local\Temp\25CD.exe1⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\ab1014fa-a295-400b-adb4-ec3ec2588560\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\ab1014fa-a295-400b-adb4-ec3ec2588560\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\ab1014fa-a295-400b-adb4-ec3ec2588560\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\ab1014fa-a295-400b-adb4-ec3ec2588560\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\ab1014fa-a295-400b-adb4-ec3ec2588560\AdvancedRun.exe" /SpecialRun 4101d8 20123⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\25CD.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\25CD.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Microsoft.Workflow.Compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\Microsoft.Workflow.Compiler.exe2⤵PID:4104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ComSvcConfig.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\ComSvcConfig.exe2⤵PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\334B.exeC:\Users\Admin\AppData\Local\Temp\334B.exe1⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Fineeest_.exe"C:\Users\Admin\AppData\Local\Temp\Fineeest_.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\1000 hq.exe"C:\Users\Admin\AppData\Local\Temp\1000 hq.exe"2⤵
- Executes dropped EXE
PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\PryntVirus.exe"C:\Users\Admin\AppData\Local\Temp\PryntVirus.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:2100 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵PID:4028
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3668
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵PID:2340
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵PID:408
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:4688
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵PID:4200
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\AppData\Local\Temp\PryntVirus.exe"3⤵
- Creates scheduled task(s)
PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\34E2.exeC:\Users\Admin\AppData\Local\Temp\34E2.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:416 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -start2⤵
- Enumerates connected drives
PID:3928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:2112
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -agent 03⤵
- Drops file in Program Files directory
PID:1892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:4636
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:4252
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:4520
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:4432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:2108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 17683⤵
- Program crash
PID:1540
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\36E7.exeC:\Users\Admin\AppData\Local\Temp\36E7.exe1⤵
- Executes dropped EXE
PID:3696
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3928
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3960
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2140
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:636
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4328
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4484
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4648
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4764
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4836
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5112
-
C:\Users\Admin\AppData\Roaming\hdwsubeC:\Users\Admin\AppData\Roaming\hdwsube1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4236 -
C:\Users\Admin\AppData\Roaming\hdwsubeC:\Users\Admin\AppData\Roaming\hdwsube2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4976
-
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
4File Deletion
2Modify Registry
6Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
MD5
8adee44b1c7389a7ee46f118065ecd4a
SHA1fcb202f520bc7606248d5f2b3ef43ef1b4e62f06
SHA256140974611f50d2b3bf08a52d221a0a0cfe9e06fe6afac6df16e6f73dfefb6127
SHA5129bcebce8f341700ded4e0f8011e1bbad216c03c8cba62eea0fd6999f0ebe65178a46fc3db7662a1dd6c34076517aaef2d55356aafbf5ec979c1d2c08dc9f4cd9
-
MD5
80e9d57e4ad9e2fde3c762de3544279f
SHA126f5d127e552dde5e0ea808d998fcacc63113376
SHA256ef5c9536cf221c5556ea78e39e4df0b7aa839f2028aa6b67d28f57810e484be1
SHA5128a4996d6f289ebfb016127a62b835512178fd745fe527e16275429c543a4842529538202d78426686aebbb63132d762eb90f8f1dfa7cd2e5304abe73465f1c86
-
MD5
80e9d57e4ad9e2fde3c762de3544279f
SHA126f5d127e552dde5e0ea808d998fcacc63113376
SHA256ef5c9536cf221c5556ea78e39e4df0b7aa839f2028aa6b67d28f57810e484be1
SHA5128a4996d6f289ebfb016127a62b835512178fd745fe527e16275429c543a4842529538202d78426686aebbb63132d762eb90f8f1dfa7cd2e5304abe73465f1c86
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
067a8002b76c49e820a9421fa3029c86
SHA1fbf589bf5e44768d9ed07f6b361472e3b54bcb58
SHA2569fdf1b38392cacb2490a8093fc910e2af3817e92ab459304d721919a63cbfe64
SHA5124986054c30b069cc145dde03244589eb06513211723ca11cd97204c748b43c07b6f16bab7b9203c3d53a20176879eb467debf90bde43a5a66d23587243fed03a
-
MD5
f19e1f71dd14af5671f5550fba6c8998
SHA18ef9d670f6bafed77cd9720533dfb15b79982a40
SHA25649398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60
SHA512095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610
-
MD5
f19e1f71dd14af5671f5550fba6c8998
SHA18ef9d670f6bafed77cd9720533dfb15b79982a40
SHA25649398cbf38dc71aca96c6726f9c914a04ee49a9350943896435fc776be640b60
SHA512095a90dfba1f0b175109ad1dfa2134c5488793ba80decd7a63ce3f0d3060b19d950e75d150c743a72d82b089cfad2ab31111aa7a82fd69f03d420686dda4a610
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
6a2d7f7373c59ff8be992d223b17f97f
SHA1e4bfe1e9fdb7560968da08e1dfe6ed8005a97223
SHA2563b8cef83d5f3b667281c3c8512b2e21d06e34a3fe7952d171854a36f557f80a9
SHA512f8719c97f97ceb16ce63b832bd393edb3ef87d8d7aac1d975243cd4aac62e2775eae2b1fd2d0314348144c1b38d19b31222f70c33fdd3133a483e9392d2de0c6
-
MD5
a27bb701996b02f907c05e83a2793814
SHA145cf24838dc199df772f78d480d3eb31754714bc
SHA256648b91f171dbe77bad4b08b6ba16734bc5523bfe58c89c34fbac98a054c39edd
SHA5129b18aca25563f0dd6e20c3deb41834b55d5455dde7ef802b291e95475d23c99a1f8f5c0d0b227028f578610292b3ba4ff0b528785cec821af2daf4fa93ea6d13
-
MD5
a27bb701996b02f907c05e83a2793814
SHA145cf24838dc199df772f78d480d3eb31754714bc
SHA256648b91f171dbe77bad4b08b6ba16734bc5523bfe58c89c34fbac98a054c39edd
SHA5129b18aca25563f0dd6e20c3deb41834b55d5455dde7ef802b291e95475d23c99a1f8f5c0d0b227028f578610292b3ba4ff0b528785cec821af2daf4fa93ea6d13
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
bdfde890a781bf135e6eb4339ff9424f
SHA1a5bfca4601242d3ff52962432efb15ab9202217f
SHA256b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5
SHA5127af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e99afcbb149ba6dfbdd90c034b88fe73
SHA1be974111ad0a8f3870d09706ea07b5438f418798
SHA256924b9935b1f2be85aa36e0158f0a55c1200cdf9046077a5b491f1aeb034c2353
SHA512bf8b1f544ab9e689068f94b7ee5cfbe304b3756308d022be2e487216dd01aed0fcc2ac76e5d6b4c2f434a1125a88d5c71a2ecdafdb7bddd82447e77601c6b4a9
-
MD5
e5509d55d22e60402457e60be6ed85ce
SHA1762d6334e098d9cbd028e7f2a83c0d77ff2c2086
SHA2560c054e57af039fad6d57bd187b0646c16f64bc5430087db8939a0c5fa75f72c9
SHA51221bab40514c678c4f6d38960cd25bf512d91c75f5900e8f679b31d4e34d0b638ff067194ca7ca1f5ccbbc5e137d636a1cd0cb85ffd19bd28301ef397534cefed
-
MD5
e5509d55d22e60402457e60be6ed85ce
SHA1762d6334e098d9cbd028e7f2a83c0d77ff2c2086
SHA2560c054e57af039fad6d57bd187b0646c16f64bc5430087db8939a0c5fa75f72c9
SHA51221bab40514c678c4f6d38960cd25bf512d91c75f5900e8f679b31d4e34d0b638ff067194ca7ca1f5ccbbc5e137d636a1cd0cb85ffd19bd28301ef397534cefed
-
MD5
af706e535a57ea4a789f311567870803
SHA13578e1893aee7f4e9cdd1dcf0f8d9292804b21ca
SHA256c30c4c74da8351ad23e8466a314a32243f7c1e82af117a89961eaaecb57b320b
SHA5125545a9ad07cce205ea755c6ac5307b961c25a4da73a6fc2c2af3620a44664ef5ea949144e750749cfcf7223497df3e662b96f5803d6b4a8559b749a01f97d333
-
MD5
af706e535a57ea4a789f311567870803
SHA13578e1893aee7f4e9cdd1dcf0f8d9292804b21ca
SHA256c30c4c74da8351ad23e8466a314a32243f7c1e82af117a89961eaaecb57b320b
SHA5125545a9ad07cce205ea755c6ac5307b961c25a4da73a6fc2c2af3620a44664ef5ea949144e750749cfcf7223497df3e662b96f5803d6b4a8559b749a01f97d333
-
MD5
1add1cd4f3138cdc7dc07cbbe49a765c
SHA141e417f3c306ed435144ba4539424e977f5f09e7
SHA256b6ff6028464839c63f6bb6a1e66574382b0d89d022ee975a119d0791fd82f1a2
SHA512d49297471a84bab8783e93e8d9dfeb27241f13ae9c74c4cd22e112454e42f5c7d22f5ad46c06c4dba41b74bd91dee4c1330c52f5158a20aca98ef6a82f90dae5
-
MD5
1add1cd4f3138cdc7dc07cbbe49a765c
SHA141e417f3c306ed435144ba4539424e977f5f09e7
SHA256b6ff6028464839c63f6bb6a1e66574382b0d89d022ee975a119d0791fd82f1a2
SHA512d49297471a84bab8783e93e8d9dfeb27241f13ae9c74c4cd22e112454e42f5c7d22f5ad46c06c4dba41b74bd91dee4c1330c52f5158a20aca98ef6a82f90dae5
-
MD5
c2f1a5eae2e3d839725b5d3ec21f926d
SHA1ec5cc9453a52e46a4ca402b476ebfc480a03cbd0
SHA25627740a031a847e5a87ee023ed0f4b6ef993fe01f33c31d2a3bd40ef3cc207cbc
SHA512ffb73235b0b26d474a4216bd4fe4ead690ccde4773011c223bb86aaa8c1d4d8154c06df388f155502689e828e8dd41b9d2c284fb19bb8eef66fe23c6accd0909
-
MD5
c2f1a5eae2e3d839725b5d3ec21f926d
SHA1ec5cc9453a52e46a4ca402b476ebfc480a03cbd0
SHA25627740a031a847e5a87ee023ed0f4b6ef993fe01f33c31d2a3bd40ef3cc207cbc
SHA512ffb73235b0b26d474a4216bd4fe4ead690ccde4773011c223bb86aaa8c1d4d8154c06df388f155502689e828e8dd41b9d2c284fb19bb8eef66fe23c6accd0909
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
MD5
ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
MD5
5b9805d7b48c07d06c115c68f6453126
SHA15d9fd16789e50eeb8dde5cfe06562328ae1620e2
SHA2565739ea70dbe1a9d014b42300149b2ccbcf628cf08af00053708003caf3bbc14d
SHA5122e19f2979ebea298e526586cd858f1da2ba19ef0a3903244f6dcd930cc478b5034014fb4d9df3f568eb04fdb8a6329847609834ec330002728ea1858fd7528c2
-
MD5
5b9805d7b48c07d06c115c68f6453126
SHA15d9fd16789e50eeb8dde5cfe06562328ae1620e2
SHA2565739ea70dbe1a9d014b42300149b2ccbcf628cf08af00053708003caf3bbc14d
SHA5122e19f2979ebea298e526586cd858f1da2ba19ef0a3903244f6dcd930cc478b5034014fb4d9df3f568eb04fdb8a6329847609834ec330002728ea1858fd7528c2
-
MD5
5b9805d7b48c07d06c115c68f6453126
SHA15d9fd16789e50eeb8dde5cfe06562328ae1620e2
SHA2565739ea70dbe1a9d014b42300149b2ccbcf628cf08af00053708003caf3bbc14d
SHA5122e19f2979ebea298e526586cd858f1da2ba19ef0a3903244f6dcd930cc478b5034014fb4d9df3f568eb04fdb8a6329847609834ec330002728ea1858fd7528c2
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4