Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29/08/2021, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
b59298142204c67f7d1de090683c8379.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
b59298142204c67f7d1de090683c8379.exe
Resource
win10v20210408
General
-
Target
b59298142204c67f7d1de090683c8379.exe
-
Size
139KB
-
MD5
b59298142204c67f7d1de090683c8379
-
SHA1
bded90a1af1f05eb84b8bc338b6dbd87242a7019
-
SHA256
c47be8455733bb50fb191d747a5b7c4427fae086296ffbedc2cd7c235bd194bf
-
SHA512
3937794effe2fde3ac97f106d2d9e3a9c5c09aa29d103fb0b02048c850c9dc28458b043aa3a6641bf6af004186301a966dea2961fc0ba13ed6b0302a00415f7c
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
raccoon
fe582536ec580228180f270f7cb80a867860e010
-
url4cnc
https://telete.in/xylichanjk
Extracted
raccoon
20d9c80657d1d0fda9625cbd629ba419b8a34404
-
url4cnc
https://telete.in/hfuimoneymake
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Extracted
redline
95.217.117.91:21361
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral2/memory/2920-187-0x0000000002010000-0x000000000202F000-memory.dmp family_redline behavioral2/memory/2920-192-0x0000000003E40000-0x0000000003E5E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 212 created 3048 212 WerFault.exe 80 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 1940 F5A0.exe 3048 F6AB.exe 2020 549B.exe 2208 5B33.exe 1144 5CAB.exe 2920 62C7.exe 3916 672D.exe 2940 TrustedInstaller.exe 3740 TrustedInstaller.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5B33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5B33.exe -
Deletes itself 1 IoCs
pid Process 2568 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 3048 F6AB.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000200000001ab38-133.dat themida behavioral2/files/0x000200000001ab38-135.dat themida behavioral2/memory/2208-209-0x0000000000D00000-0x0000000000D01000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run 672D.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\TrustedInstaller.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\TrustedInstaller.exe\" -start" 672D.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5B33.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: TrustedInstaller.exe File opened (read-only) \??\K: TrustedInstaller.exe File opened (read-only) \??\J: TrustedInstaller.exe File opened (read-only) \??\I: TrustedInstaller.exe File opened (read-only) \??\X: TrustedInstaller.exe File opened (read-only) \??\T: TrustedInstaller.exe File opened (read-only) \??\Q: TrustedInstaller.exe File opened (read-only) \??\P: TrustedInstaller.exe File opened (read-only) \??\H: TrustedInstaller.exe File opened (read-only) \??\G: TrustedInstaller.exe File opened (read-only) \??\F: TrustedInstaller.exe File opened (read-only) \??\E: TrustedInstaller.exe File opened (read-only) \??\Y: TrustedInstaller.exe File opened (read-only) \??\W: TrustedInstaller.exe File opened (read-only) \??\V: TrustedInstaller.exe File opened (read-only) \??\N: TrustedInstaller.exe File opened (read-only) \??\R: TrustedInstaller.exe File opened (read-only) \??\L: TrustedInstaller.exe File opened (read-only) \??\A: TrustedInstaller.exe File opened (read-only) \??\B: TrustedInstaller.exe File opened (read-only) \??\Z: TrustedInstaller.exe File opened (read-only) \??\U: TrustedInstaller.exe File opened (read-only) \??\S: TrustedInstaller.exe File opened (read-only) \??\M: TrustedInstaller.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2208 5B33.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 644 set thread context of 3752 644 b59298142204c67f7d1de090683c8379.exe 75 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Trial-ul-oob.xrm-ms.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusDemoR_BypassTrial365-ul-oob.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_KMS_Client_AE-ppd.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setEmbeddedCP TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.webapp.nl_zh_4.4.0.v20140623020002.jar TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application.xml.payfast.2E2-846-474 TrustedInstaller.exe File created C:\Program Files\Java\jre1.8.0_66\lib\management\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\tracedefinition130.xml TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART4.BDR TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightItalic.ttf.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-output2.xml.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-startup.xml TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\Classic.dotx TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\readme.txt.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-awt_zh_CN.jar.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-core.xml TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-heapwalker.xml TrustedInstaller.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\sk\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\DUBAI-LIGHT.TTF.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\CONCRETE.INF TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt TrustedInstaller.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jfxswt.jar.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-ul-oob.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-pl.xrm-ms.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalDemoR_BypassTrial180-ul-oob.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-black_scale-80.png.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN082.XML TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\classlist TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.zh_CN_5.5.0.165303.jar TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.security.ui_1.1.200.v20130626-2037.jar.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.update.configurator_3.3.300.v20140518-1928.jar.payfast.2E2-846-474 TrustedInstaller.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\REFINED\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_Subscription-ppd.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_MAK-ppd.xrm-ms.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\bwclassic.dotx.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\QUAD\THMBNAIL.PNG.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\powerview.x-none.msi.16.x-none.tree.dat.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Retail-ul-oob.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Retail-ul-oob.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Grace-ul-oob.xrm-ms.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProDemoR_BypassTrial180-ppd.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.felix.gogo.shell_0.10.0.v201212101605.jar TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring-impl.xml.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-ppd.xrm-ms.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-100.png.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\LTSHYPH_EN.LEX TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.properties.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\feature.properties TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-progress-ui_zh_CN.jar.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LAYERS\LAYERS.INF TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.ui.ja_5.5.0.165303.jar TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes.nl_ja_4.4.0.v20140623020002.jar TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] TrustedInstaller.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\charsets.jar TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECLIPSE\THMBNAIL.PNG TrustedInstaller.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\plugin.jar.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTrial-ppd.xrm-ms TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC_K_COL.HXK.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-100.png.payfast.2E2-846-474 TrustedInstaller.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-modules-profiler.jar TrustedInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
pid pid_target Process procid_target 3852 3048 WerFault.exe 80 1948 3048 WerFault.exe 80 3076 3048 WerFault.exe 80 3928 3048 WerFault.exe 80 2540 3048 WerFault.exe 80 3464 3048 WerFault.exe 80 2292 3048 WerFault.exe 80 2244 3048 WerFault.exe 80 2828 3048 WerFault.exe 80 4068 3048 WerFault.exe 80 4064 3048 WerFault.exe 80 3912 3048 WerFault.exe 80 3796 3048 WerFault.exe 80 212 3048 WerFault.exe 80 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b59298142204c67f7d1de090683c8379.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b59298142204c67f7d1de090683c8379.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b59298142204c67f7d1de090683c8379.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 188 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3752 b59298142204c67f7d1de090683c8379.exe 3752 b59298142204c67f7d1de090683c8379.exe 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2568 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 3752 b59298142204c67f7d1de090683c8379.exe 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found 2568 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeRestorePrivilege 3852 WerFault.exe Token: SeBackupPrivilege 3852 WerFault.exe Token: SeDebugPrivilege 3852 WerFault.exe Token: SeDebugPrivilege 1948 WerFault.exe Token: SeDebugPrivilege 3076 WerFault.exe Token: SeDebugPrivilege 3928 WerFault.exe Token: SeDebugPrivilege 2540 WerFault.exe Token: SeDebugPrivilege 3464 WerFault.exe Token: SeDebugPrivilege 2292 WerFault.exe Token: SeDebugPrivilege 2244 WerFault.exe Token: SeDebugPrivilege 2828 WerFault.exe Token: SeDebugPrivilege 4068 WerFault.exe Token: SeDebugPrivilege 4064 WerFault.exe Token: SeDebugPrivilege 3912 WerFault.exe Token: SeDebugPrivilege 3796 WerFault.exe Token: SeDebugPrivilege 212 WerFault.exe Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeIncreaseQuotaPrivilege 1628 WMIC.exe Token: SeSecurityPrivilege 1628 WMIC.exe Token: SeTakeOwnershipPrivilege 1628 WMIC.exe Token: SeLoadDriverPrivilege 1628 WMIC.exe Token: SeSystemProfilePrivilege 1628 WMIC.exe Token: SeSystemtimePrivilege 1628 WMIC.exe Token: SeProfSingleProcessPrivilege 1628 WMIC.exe Token: SeIncBasePriorityPrivilege 1628 WMIC.exe Token: SeCreatePagefilePrivilege 1628 WMIC.exe Token: SeBackupPrivilege 1628 WMIC.exe Token: SeRestorePrivilege 1628 WMIC.exe Token: SeShutdownPrivilege 1628 WMIC.exe Token: SeDebugPrivilege 1628 WMIC.exe Token: SeSystemEnvironmentPrivilege 1628 WMIC.exe Token: SeRemoteShutdownPrivilege 1628 WMIC.exe Token: SeUndockPrivilege 1628 WMIC.exe Token: SeManageVolumePrivilege 1628 WMIC.exe Token: 33 1628 WMIC.exe Token: 34 1628 WMIC.exe Token: 35 1628 WMIC.exe Token: 36 1628 WMIC.exe Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeShutdownPrivilege 2568 Process not Found Token: SeCreatePagefilePrivilege 2568 Process not Found Token: SeBackupPrivilege 1004 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1940 F5A0.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2568 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 3752 644 b59298142204c67f7d1de090683c8379.exe 75 PID 644 wrote to memory of 3752 644 b59298142204c67f7d1de090683c8379.exe 75 PID 644 wrote to memory of 3752 644 b59298142204c67f7d1de090683c8379.exe 75 PID 644 wrote to memory of 3752 644 b59298142204c67f7d1de090683c8379.exe 75 PID 644 wrote to memory of 3752 644 b59298142204c67f7d1de090683c8379.exe 75 PID 644 wrote to memory of 3752 644 b59298142204c67f7d1de090683c8379.exe 75 PID 2568 wrote to memory of 1940 2568 Process not Found 79 PID 2568 wrote to memory of 1940 2568 Process not Found 79 PID 2568 wrote to memory of 1940 2568 Process not Found 79 PID 2568 wrote to memory of 3048 2568 Process not Found 80 PID 2568 wrote to memory of 3048 2568 Process not Found 80 PID 2568 wrote to memory of 3048 2568 Process not Found 80 PID 2568 wrote to memory of 2020 2568 Process not Found 96 PID 2568 wrote to memory of 2020 2568 Process not Found 96 PID 2568 wrote to memory of 2020 2568 Process not Found 96 PID 2568 wrote to memory of 2208 2568 Process not Found 97 PID 2568 wrote to memory of 2208 2568 Process not Found 97 PID 2568 wrote to memory of 2208 2568 Process not Found 97 PID 2568 wrote to memory of 1144 2568 Process not Found 99 PID 2568 wrote to memory of 1144 2568 Process not Found 99 PID 2568 wrote to memory of 1144 2568 Process not Found 99 PID 2568 wrote to memory of 2920 2568 Process not Found 100 PID 2568 wrote to memory of 2920 2568 Process not Found 100 PID 2568 wrote to memory of 2920 2568 Process not Found 100 PID 2568 wrote to memory of 3916 2568 Process not Found 102 PID 2568 wrote to memory of 3916 2568 Process not Found 102 PID 2568 wrote to memory of 3916 2568 Process not Found 102 PID 2568 wrote to memory of 3952 2568 Process not Found 103 PID 2568 wrote to memory of 3952 2568 Process not Found 103 PID 2568 wrote to memory of 3952 2568 Process not Found 103 PID 2568 wrote to memory of 3952 2568 Process not Found 103 PID 2568 wrote to memory of 2804 2568 Process not Found 104 PID 2568 wrote to memory of 2804 2568 Process not Found 104 PID 2568 wrote to memory of 2804 2568 Process not Found 104 PID 2568 wrote to memory of 2280 2568 Process not Found 105 PID 2568 wrote to memory of 2280 2568 Process not Found 105 PID 2568 wrote to memory of 2280 2568 Process not Found 105 PID 2568 wrote to memory of 2280 2568 Process not Found 105 PID 2568 wrote to memory of 4088 2568 Process not Found 106 PID 2568 wrote to memory of 4088 2568 Process not Found 106 PID 2568 wrote to memory of 4088 2568 Process not Found 106 PID 2568 wrote to memory of 2272 2568 Process not Found 107 PID 2568 wrote to memory of 2272 2568 Process not Found 107 PID 2568 wrote to memory of 2272 2568 Process not Found 107 PID 2568 wrote to memory of 2272 2568 Process not Found 107 PID 2568 wrote to memory of 1124 2568 Process not Found 108 PID 2568 wrote to memory of 1124 2568 Process not Found 108 PID 2568 wrote to memory of 1124 2568 Process not Found 108 PID 2568 wrote to memory of 3796 2568 Process not Found 109 PID 2568 wrote to memory of 3796 2568 Process not Found 109 PID 2568 wrote to memory of 3796 2568 Process not Found 109 PID 2568 wrote to memory of 3796 2568 Process not Found 109 PID 2568 wrote to memory of 2428 2568 Process not Found 110 PID 2568 wrote to memory of 2428 2568 Process not Found 110 PID 2568 wrote to memory of 2428 2568 Process not Found 110 PID 3916 wrote to memory of 2940 3916 672D.exe 111 PID 3916 wrote to memory of 2940 3916 672D.exe 111 PID 3916 wrote to memory of 2940 3916 672D.exe 111 PID 2568 wrote to memory of 1552 2568 Process not Found 112 PID 2568 wrote to memory of 1552 2568 Process not Found 112 PID 2568 wrote to memory of 1552 2568 Process not Found 112 PID 2568 wrote to memory of 1552 2568 Process not Found 112 PID 2940 wrote to memory of 2020 2940 TrustedInstaller.exe 113 PID 2940 wrote to memory of 2020 2940 TrustedInstaller.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\b59298142204c67f7d1de090683c8379.exe"C:\Users\Admin\AppData\Local\Temp\b59298142204c67f7d1de090683c8379.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\b59298142204c67f7d1de090683c8379.exe"C:\Users\Admin\AppData\Local\Temp\b59298142204c67f7d1de090683c8379.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\F5A0.exeC:\Users\Admin\AppData\Local\Temp\F5A0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1940
-
C:\Users\Admin\AppData\Local\Temp\F6AB.exeC:\Users\Admin\AppData\Local\Temp\F6AB.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 7442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 8122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 8882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 8082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 11842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 11962⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 13082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 13442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 11602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 12722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 13842⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 14282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 13442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 12882⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\549B.exeC:\Users\Admin\AppData\Local\Temp\549B.exe1⤵
- Executes dropped EXE
PID:2020
-
C:\Users\Admin\AppData\Local\Temp\5B33.exeC:\Users\Admin\AppData\Local\Temp\5B33.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2208
-
C:\Users\Admin\AppData\Local\Temp\5CAB.exeC:\Users\Admin\AppData\Local\Temp\5CAB.exe1⤵
- Executes dropped EXE
PID:1144
-
C:\Users\Admin\AppData\Local\Temp\62C7.exeC:\Users\Admin\AppData\Local\Temp\62C7.exe1⤵
- Executes dropped EXE
PID:2920
-
C:\Users\Admin\AppData\Local\Temp\672D.exeC:\Users\Admin\AppData\Local\Temp\672D.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:2020
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:192
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:1144
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3740
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:3948
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:188
-
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3952
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2804
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2280
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4088
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2272
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1124
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3796
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2428
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1552
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1004