Analysis
-
max time kernel
139s -
max time network
161s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-08-2021 00:21
Static task
static1
Behavioral task
behavioral1
Sample
99d5b8b376944920ff01a8737f9cbdbd.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
99d5b8b376944920ff01a8737f9cbdbd.exe
Resource
win10v20210408
General
-
Target
99d5b8b376944920ff01a8737f9cbdbd.exe
-
Size
213KB
-
MD5
99d5b8b376944920ff01a8737f9cbdbd
-
SHA1
f0c35ecdf80f44727284c6cc4281bb1a8bd4dede
-
SHA256
2189c55c45bdae4c6c966d1fe88312cd12b841b86ffaee29a0512a590f11718b
-
SHA512
1a2b19b93ad2417db4f80b94abc2b738e2f0dc0558b355c51817161d5f7666d35be2dafb505ac297b3f94f5593d16fb9b862ea36c03580c4168add426e341882
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
redline
zz
185.167.97.37:30902
Extracted
redline
nn
135.181.49.56:47634
Extracted
raccoon
d02c5d65069fc7ce1993e7c52edf0c9c4c195c81
-
url4cnc
https://telete.in/open3entershift
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 41 IoCs
resource yara_rule behavioral2/memory/3704-184-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/3704-185-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/2376-195-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/2376-198-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/2376-220-0x0000000005010000-0x0000000005616000-memory.dmp family_redline behavioral2/memory/184-235-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/2060-276-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/2060-291-0x0000000005070000-0x0000000005676000-memory.dmp family_redline behavioral2/memory/4508-302-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/4508-313-0x0000000005340000-0x0000000005946000-memory.dmp family_redline behavioral2/memory/4804-340-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/4152-384-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/4544-448-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/2040-522-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/4288-580-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/504-632-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/504-660-0x0000000005740000-0x0000000005D46000-memory.dmp family_redline behavioral2/memory/2052-718-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/2052-743-0x0000000004D90000-0x0000000005396000-memory.dmp family_redline behavioral2/memory/5320-816-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/5320-847-0x0000000005370000-0x0000000005976000-memory.dmp family_redline behavioral2/memory/5804-863-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/5804-884-0x00000000056A0000-0x0000000005CA6000-memory.dmp family_redline behavioral2/memory/636-894-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/5584-967-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/5584-980-0x0000000004C50000-0x0000000005256000-memory.dmp family_redline behavioral2/memory/6084-1000-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/4944-1021-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/4944-1035-0x0000000004D70000-0x0000000005376000-memory.dmp family_redline behavioral2/memory/5948-1039-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/4712-1057-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/3032-1083-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/3032-1091-0x0000000004F20000-0x0000000005526000-memory.dmp family_redline behavioral2/memory/1140-1101-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/1140-1108-0x0000000005250000-0x0000000005856000-memory.dmp family_redline behavioral2/memory/5888-1120-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/5888-1129-0x0000000005440000-0x0000000005A46000-memory.dmp family_redline behavioral2/memory/5204-1140-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/5204-1149-0x00000000057B0000-0x0000000005DB6000-memory.dmp family_redline behavioral2/memory/4828-1159-0x000000000041C5C6-mapping.dmp family_redline behavioral2/memory/4828-1168-0x0000000005380000-0x0000000005986000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 4852 created 2168 4852 WerFault.exe 84 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
resource yara_rule behavioral2/files/0x000100000001ab4a-157.dat Nirsoft behavioral2/files/0x000100000001ab4a-160.dat Nirsoft behavioral2/files/0x000100000001ab4a-166.dat Nirsoft -
Executes dropped EXE 35 IoCs
pid Process 3872 56EB.exe 764 5D35.exe 2108 5EEC.exe 2168 60E1.exe 2740 6314.exe 3952 6B33.exe 3768 AdvancedRun.exe 2376 AdvancedRun.exe 1864 56EB.exe 3704 56EB.exe 1380 spoolsv.exe 184 56EB.exe 2060 56EB.exe 4508 56EB.exe 4804 56EB.exe 4152 56EB.exe 4544 56EB.exe 2040 56EB.exe 4460 spoolsv.exe 4288 56EB.exe 504 56EB.exe 2052 56EB.exe 5320 56EB.exe 5804 56EB.exe 636 56EB.exe 5584 56EB.exe 6084 56EB.exe 4944 56EB.exe 5948 56EB.exe 4712 56EB.exe 4536 56EB.exe 3032 56EB.exe 1140 56EB.exe 1056 56EB.exe 5888 56EB.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5D35.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5D35.exe -
Deletes itself 1 IoCs
pid Process 3020 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 2168 60E1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000200000001ab45-125.dat themida behavioral2/files/0x000200000001ab45-126.dat themida behavioral2/memory/764-140-0x00000000008D0000-0x00000000008D1000-memory.dmp themida -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 5EEC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 5EEC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5EEC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 5EEC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 5EEC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\5EEC.exe = "0" 5EEC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 5EEC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5EEC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 5EEC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 5EEC.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\spoolsv.exe\" -start" 6314.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run 6314.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5D35.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5EEC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5EEC.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: spoolsv.exe File opened (read-only) \??\H: spoolsv.exe File opened (read-only) \??\G: spoolsv.exe File opened (read-only) \??\F: spoolsv.exe File opened (read-only) \??\Y: spoolsv.exe File opened (read-only) \??\V: spoolsv.exe File opened (read-only) \??\Q: spoolsv.exe File opened (read-only) \??\P: spoolsv.exe File opened (read-only) \??\I: spoolsv.exe File opened (read-only) \??\E: spoolsv.exe File opened (read-only) \??\B: spoolsv.exe File opened (read-only) \??\A: spoolsv.exe File opened (read-only) \??\Z: spoolsv.exe File opened (read-only) \??\S: spoolsv.exe File opened (read-only) \??\T: spoolsv.exe File opened (read-only) \??\W: spoolsv.exe File opened (read-only) \??\U: spoolsv.exe File opened (read-only) \??\O: spoolsv.exe File opened (read-only) \??\M: spoolsv.exe File opened (read-only) \??\L: spoolsv.exe File opened (read-only) \??\K: spoolsv.exe File opened (read-only) \??\J: spoolsv.exe File opened (read-only) \??\X: spoolsv.exe File opened (read-only) \??\R: spoolsv.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 geoiptool.com 41 geoiptool.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 764 5D35.exe 3952 6B33.exe 3952 6B33.exe 3952 6B33.exe 3952 6B33.exe 3952 6B33.exe 3952 6B33.exe -
Suspicious use of SetThreadContext 24 IoCs
description pid Process procid_target PID 992 set thread context of 756 992 99d5b8b376944920ff01a8737f9cbdbd.exe 77 PID 3872 set thread context of 3704 3872 56EB.exe 93 PID 2108 set thread context of 2376 2108 5EEC.exe 102 PID 3872 set thread context of 184 3872 56EB.exe 100 PID 3872 set thread context of 2060 3872 56EB.exe 109 PID 3872 set thread context of 4508 3872 56EB.exe 113 PID 3872 set thread context of 4804 3872 56EB.exe 116 PID 3872 set thread context of 4152 3872 56EB.exe 119 PID 3872 set thread context of 4544 3872 56EB.exe 122 PID 3872 set thread context of 2040 3872 56EB.exe 124 PID 3872 set thread context of 4288 3872 56EB.exe 126 PID 3872 set thread context of 504 3872 56EB.exe 141 PID 3872 set thread context of 2052 3872 56EB.exe 146 PID 3872 set thread context of 5320 3872 56EB.exe 148 PID 3872 set thread context of 5804 3872 56EB.exe 149 PID 3872 set thread context of 636 3872 56EB.exe 150 PID 3872 set thread context of 5584 3872 56EB.exe 152 PID 3872 set thread context of 6084 3872 56EB.exe 153 PID 3872 set thread context of 4944 3872 56EB.exe 154 PID 3872 set thread context of 5948 3872 56EB.exe 155 PID 3872 set thread context of 4712 3872 56EB.exe 156 PID 3872 set thread context of 3032 3872 56EB.exe 158 PID 3872 set thread context of 1140 3872 56EB.exe 159 PID 3872 set thread context of 5888 3872 56EB.exe 161 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-swing-tabcontrol.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-services_zh_CN.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\AddExit.vssx spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_zh_4.4.0.v20140623020002.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.syntheticattribute.exsd.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\plugin.properties.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-options-keymap.xml.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-options.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.zh_CN_5.5.0.165303.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme.nl_ja_4.4.0.v20140623020002.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository_1.2.100.v20131209-2144.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help_3.6.0.v20130326-1254.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.nl_ja_4.4.0.v20140623020002.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.httpcomponents.httpclient_4.2.6.v201311072007.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.nl_zh_4.4.0.v20140623020002.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf_1.1.0.v20140408-1354.jar spoolsv.exe File opened for modification C:\Program Files\NewResume.zip.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jawt.h.payfast.242-67A-87B spoolsv.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.ja_5.5.0.165303.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.commons.logging_1.1.1.v201101211721.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedback.gif.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-favorites.xml.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\org-openide-util-lookup_ja.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-actions_ja.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winClassicTSFrame.png spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\feature.xml.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\MANIFEST.MF spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.sdk_1.0.300.v20140407-1803.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jetty.util_8.1.14.v20131031.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.console.nl_zh_4.4.0.v20140623020002.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-spi-quicksearch_zh_CN.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-selector-api.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\MANIFEST.MF.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.RSA spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-favorites.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_zh_CN.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-common.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.components.ui_5.5.0.165303.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository.nl_ja_4.4.0.v20140623020002.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui_2.3.0.v20140404-1657.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ko_KR.jar.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jawt.h spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.properties spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\com.jrockit.mc.rcp.product_root_5.5.0.165303 spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\com.jrockit.mc.console.ui.notification_contexts.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_basestyle.css spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-editor-mimelookup.xml.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-selector-ui.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-queries.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ru.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\cldrdata.jar.payfast.242-67A-87B spoolsv.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.common_5.5.0.165303.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.w3c.css.sac_1.3.1.v200903091627.jar spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\cursors.properties spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.RSA.payfast.242-67A-87B spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-search.xml spoolsv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jvm.xml.payfast.242-67A-87B spoolsv.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
pid pid_target Process procid_target 4260 2168 WerFault.exe 84 4388 2168 WerFault.exe 84 4584 2168 WerFault.exe 84 4728 2168 WerFault.exe 84 4992 2168 WerFault.exe 84 4320 2168 WerFault.exe 84 4532 2168 WerFault.exe 84 3564 2168 WerFault.exe 84 4532 2168 WerFault.exe 84 4156 2040 WerFault.exe 124 4340 2168 WerFault.exe 84 4776 2168 WerFault.exe 84 4336 2168 WerFault.exe 84 4852 2168 WerFault.exe 84 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99d5b8b376944920ff01a8737f9cbdbd.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99d5b8b376944920ff01a8737f9cbdbd.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 99d5b8b376944920ff01a8737f9cbdbd.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4780 vssadmin.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 6314.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 6314.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 756 99d5b8b376944920ff01a8737f9cbdbd.exe 756 99d5b8b376944920ff01a8737f9cbdbd.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 756 99d5b8b376944920ff01a8737f9cbdbd.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeDebugPrivilege 3768 AdvancedRun.exe Token: SeImpersonatePrivilege 3768 AdvancedRun.exe Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeDebugPrivilege 2376 AdvancedRun.exe Token: SeImpersonatePrivilege 2376 AdvancedRun.exe Token: SeDebugPrivilege 2108 5EEC.exe Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeDebugPrivilege 764 5D35.exe Token: SeDebugPrivilege 3952 6B33.exe Token: SeRestorePrivilege 4260 WerFault.exe Token: SeBackupPrivilege 4260 WerFault.exe Token: SeBackupPrivilege 4260 WerFault.exe Token: SeDebugPrivilege 4260 WerFault.exe Token: SeDebugPrivilege 4388 WerFault.exe Token: SeDebugPrivilege 3704 56EB.exe Token: SeDebugPrivilege 4584 WerFault.exe Token: SeDebugPrivilege 2376 aspnet_regsql.exe Token: SeDebugPrivilege 4728 WerFault.exe Token: SeDebugPrivilege 184 56EB.exe Token: SeDebugPrivilege 4992 WerFault.exe Token: SeDebugPrivilege 2060 56EB.exe Token: SeDebugPrivilege 4320 WerFault.exe Token: SeDebugPrivilege 4532 cmd.exe Token: SeDebugPrivilege 4508 56EB.exe Token: SeDebugPrivilege 3564 WerFault.exe Token: SeDebugPrivilege 4804 56EB.exe Token: SeDebugPrivilege 4532 cmd.exe Token: SeDebugPrivilege 4340 WerFault.exe Token: SeDebugPrivilege 4776 WerFault.exe Token: SeDebugPrivilege 4152 56EB.exe Token: SeDebugPrivilege 4336 WerFault.exe Token: SeDebugPrivilege 4544 56EB.exe Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeShutdownPrivilege 3020 Process not Found Token: SeCreatePagefilePrivilege 3020 Process not Found Token: SeDebugPrivilege 4852 WerFault.exe Token: SeIncreaseQuotaPrivilege 1684 WMIC.exe Token: SeSecurityPrivilege 1684 WMIC.exe Token: SeTakeOwnershipPrivilege 1684 WMIC.exe Token: SeLoadDriverPrivilege 1684 WMIC.exe Token: SeSystemProfilePrivilege 1684 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3952 6B33.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3020 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 992 wrote to memory of 756 992 99d5b8b376944920ff01a8737f9cbdbd.exe 77 PID 992 wrote to memory of 756 992 99d5b8b376944920ff01a8737f9cbdbd.exe 77 PID 992 wrote to memory of 756 992 99d5b8b376944920ff01a8737f9cbdbd.exe 77 PID 992 wrote to memory of 756 992 99d5b8b376944920ff01a8737f9cbdbd.exe 77 PID 992 wrote to memory of 756 992 99d5b8b376944920ff01a8737f9cbdbd.exe 77 PID 992 wrote to memory of 756 992 99d5b8b376944920ff01a8737f9cbdbd.exe 77 PID 3020 wrote to memory of 3872 3020 Process not Found 79 PID 3020 wrote to memory of 3872 3020 Process not Found 79 PID 3020 wrote to memory of 3872 3020 Process not Found 79 PID 3020 wrote to memory of 764 3020 Process not Found 81 PID 3020 wrote to memory of 764 3020 Process not Found 81 PID 3020 wrote to memory of 764 3020 Process not Found 81 PID 3020 wrote to memory of 2108 3020 Process not Found 83 PID 3020 wrote to memory of 2108 3020 Process not Found 83 PID 3020 wrote to memory of 2108 3020 Process not Found 83 PID 3020 wrote to memory of 2168 3020 Process not Found 84 PID 3020 wrote to memory of 2168 3020 Process not Found 84 PID 3020 wrote to memory of 2168 3020 Process not Found 84 PID 3020 wrote to memory of 2740 3020 Process not Found 85 PID 3020 wrote to memory of 2740 3020 Process not Found 85 PID 3020 wrote to memory of 2740 3020 Process not Found 85 PID 3872 wrote to memory of 1864 3872 56EB.exe 86 PID 3872 wrote to memory of 1864 3872 56EB.exe 86 PID 3872 wrote to memory of 1864 3872 56EB.exe 86 PID 3020 wrote to memory of 3952 3020 Process not Found 87 PID 3020 wrote to memory of 3952 3020 Process not Found 87 PID 3020 wrote to memory of 3952 3020 Process not Found 87 PID 2108 wrote to memory of 3768 2108 5EEC.exe 88 PID 2108 wrote to memory of 3768 2108 5EEC.exe 88 PID 2108 wrote to memory of 3768 2108 5EEC.exe 88 PID 3768 wrote to memory of 2376 3768 AdvancedRun.exe 90 PID 3768 wrote to memory of 2376 3768 AdvancedRun.exe 90 PID 3768 wrote to memory of 2376 3768 AdvancedRun.exe 90 PID 3020 wrote to memory of 2836 3020 Process not Found 91 PID 3020 wrote to memory of 2836 3020 Process not Found 91 PID 3020 wrote to memory of 2836 3020 Process not Found 91 PID 3020 wrote to memory of 2836 3020 Process not Found 91 PID 3872 wrote to memory of 3704 3872 56EB.exe 93 PID 3872 wrote to memory of 3704 3872 56EB.exe 93 PID 3872 wrote to memory of 3704 3872 56EB.exe 93 PID 3020 wrote to memory of 3736 3020 Process not Found 94 PID 3020 wrote to memory of 3736 3020 Process not Found 94 PID 3020 wrote to memory of 3736 3020 Process not Found 94 PID 3020 wrote to memory of 2188 3020 Process not Found 95 PID 3020 wrote to memory of 2188 3020 Process not Found 95 PID 3020 wrote to memory of 2188 3020 Process not Found 95 PID 3020 wrote to memory of 2188 3020 Process not Found 95 PID 3020 wrote to memory of 4012 3020 Process not Found 96 PID 3020 wrote to memory of 4012 3020 Process not Found 96 PID 3020 wrote to memory of 4012 3020 Process not Found 96 PID 2108 wrote to memory of 644 2108 5EEC.exe 97 PID 2108 wrote to memory of 644 2108 5EEC.exe 97 PID 2108 wrote to memory of 644 2108 5EEC.exe 97 PID 3872 wrote to memory of 3704 3872 56EB.exe 93 PID 3872 wrote to memory of 3704 3872 56EB.exe 93 PID 3872 wrote to memory of 3704 3872 56EB.exe 93 PID 3872 wrote to memory of 3704 3872 56EB.exe 93 PID 3872 wrote to memory of 3704 3872 56EB.exe 93 PID 2108 wrote to memory of 2112 2108 5EEC.exe 99 PID 2108 wrote to memory of 2112 2108 5EEC.exe 99 PID 2108 wrote to memory of 2112 2108 5EEC.exe 99 PID 3872 wrote to memory of 184 3872 56EB.exe 100 PID 3872 wrote to memory of 184 3872 56EB.exe 100 PID 3872 wrote to memory of 184 3872 56EB.exe 100 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5EEC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99d5b8b376944920ff01a8737f9cbdbd.exe"C:\Users\Admin\AppData\Local\Temp\99d5b8b376944920ff01a8737f9cbdbd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\99d5b8b376944920ff01a8737f9cbdbd.exe"C:\Users\Admin\AppData\Local\Temp\99d5b8b376944920ff01a8737f9cbdbd.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:184
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 243⤵
- Program crash
PID:4156
-
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:504
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:5320
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:5804
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:5584
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:6084
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:5948
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵
- Executes dropped EXE
PID:5888
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\56EB.exeC:\Users\Admin\AppData\Local\Temp\56EB.exe2⤵PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\5D35.exeC:\Users\Admin\AppData\Local\Temp\5D35.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:764
-
C:\Users\Admin\AppData\Local\Temp\5EEC.exeC:\Users\Admin\AppData\Local\Temp\5EEC.exe1⤵
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\902601a3-dea1-4c38-abaa-f74e3a061739\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\902601a3-dea1-4c38-abaa-f74e3a061739\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\902601a3-dea1-4c38-abaa-f74e3a061739\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\902601a3-dea1-4c38-abaa-f74e3a061739\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\902601a3-dea1-4c38-abaa-f74e3a061739\AdvancedRun.exe" /SpecialRun 4101d8 37683⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5EEC.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5EEC.exe" -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regsql.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\60E1.exeC:\Users\Admin\AppData\Local\Temp\60E1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 7362⤵
- Drops file in Windows directory
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 7482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 8482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 8922⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 11882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 12242⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 11402⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 12002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 12242⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 6442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 12362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 12442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 12682⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\6314.exeC:\Users\Admin\AppData\Local\Temp\6314.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
PID:2740 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:1380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:4788
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:5044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:992
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4780
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4460
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:4968
-
-
-
C:\Users\Admin\AppData\Local\Temp\6B33.exeC:\Users\Admin\AppData\Local\Temp\6B33.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3952
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2836
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3736
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2188
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4012
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1808
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2764
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3928
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4204
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4376
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5000
-
C:\Users\Admin\AppData\Roaming\wjsadbwC:\Users\Admin\AppData\Roaming\wjsadbw1⤵PID:4648
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
4File Deletion
2Install Root Certificate
1Modify Registry
7Virtualization/Sandbox Evasion
1Web Service
1