Analysis
-
max time kernel
151s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20/09/2021, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
28ea220f0c8f906c66e1ab5657ca0260.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
28ea220f0c8f906c66e1ab5657ca0260.exe
Resource
win10v20210408
General
-
Target
28ea220f0c8f906c66e1ab5657ca0260.exe
-
Size
269KB
-
MD5
28ea220f0c8f906c66e1ab5657ca0260
-
SHA1
04d158591858f17abd9295f481c26ae7ef771e37
-
SHA256
71bbaf19229855f0bfdebbe93d12b5f5fac6c0b542b5ca3b5a00d4b088ccdadc
-
SHA512
aba54593ad2344b0c40e8942f1b4099c639eb443ec2a31c98813243bcc7f03fb192a879be7748d1681db889673e5e1e5d257d8256112359363daa0eacd945cb0
Malware Config
Extracted
smokeloader
2020
http://venerynnet1.top/
http://kevonahira2.top/
http://vegangelist3.top/
http://kingriffaele4.top/
http://arakeishant5.top/
Extracted
redline
Moneymaker
185.244.217.166:56316
Extracted
redline
installbv
80.85.137.89:17954
Extracted
redline
2k superstar
91.142.77.155:5469
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker Payload 1 IoCs
resource yara_rule behavioral2/memory/3148-131-0x00007FF71F080000-0x00007FF71F8F8000-memory.dmp family_medusalocker -
Modifies WinLogon for persistence 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\spoolsv.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\spoolsv.exe\", \"C:\\PerfLogs\\EngineDriverMaster.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\spoolsv.exe\", \"C:\\PerfLogs\\EngineDriverMaster.exe\", \"C:\\Users\\Public\\Downloads\\dwm.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\115E\\AC6.exe\", \"C:\\Windows\\System32\\EditionUpgradeManagerObj\\VSSVC.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\spoolsv.exe\", \"C:\\PerfLogs\\EngineDriverMaster.exe\", \"C:\\Users\\Public\\Downloads\\dwm.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\115E\\AC6.exe\", \"C:\\Windows\\System32\\EditionUpgradeManagerObj\\VSSVC.exe\", \"C:\\Boot\\cs-CZ\\vssadmin.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\spoolsv.exe\", \"C:\\PerfLogs\\EngineDriverMaster.exe\", \"C:\\Users\\Public\\Downloads\\dwm.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\115E\\AC6.exe\", \"C:\\Windows\\System32\\EditionUpgradeManagerObj\\VSSVC.exe\", \"C:\\Boot\\cs-CZ\\vssadmin.exe\", \"C:\\ProgramData\\Mozilla\\updates\\308046B0AF4A39CB\\AC6.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\spoolsv.exe\", \"C:\\PerfLogs\\EngineDriverMaster.exe\", \"C:\\Users\\Public\\Downloads\\dwm.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\", \"C:\\Recovery\\WindowsRE\\conhost.exe\", \"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\spoolsv.exe\", \"C:\\PerfLogs\\EngineDriverMaster.exe\", \"C:\\Users\\Public\\Downloads\\dwm.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\115E\\AC6.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\", \"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\"" DriverRealtekHDmaster.exe -
Process spawned unexpected child process 10 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4320 3372 schtasks.exe 16 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4520 3372 schtasks.exe 16 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4560 3372 schtasks.exe 16 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5028 3372 schtasks.exe 16 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 3372 schtasks.exe 16 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2304 3372 schtasks.exe 16 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 488 3372 schtasks.exe 16 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4212 3372 schtasks.exe 16 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3932 3372 schtasks.exe 16 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4164 3372 schtasks.exe 16 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral2/memory/1200-160-0x000000000041C5CE-mapping.dmp family_redline behavioral2/memory/3944-181-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/3944-183-0x000000000041C5F6-mapping.dmp family_redline behavioral2/memory/1200-158-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/3800-200-0x00000000056E0000-0x0000000005BDE000-memory.dmp family_redline behavioral2/memory/4216-225-0x0000000002270000-0x000000000228F000-memory.dmp family_redline behavioral2/memory/4216-231-0x0000000002310000-0x000000000232E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2860 bcdedit.exe 4276 bcdedit.exe -
pid Process 4400 wbadmin.exe 4536 wbadmin.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 12 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess AC6.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.udacha AC6.exe File opened for modification C:\Windows\System32\drivers\etc\networks.udacha AC6.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.udacha AC6.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess AC6.exe File opened for modification C:\Windows\System32\drivers\etc\hosts AC6.exe File opened for modification C:\Windows\System32\drivers\etc\networks AC6.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess AC6.exe File opened for modification C:\Windows\System32\drivers\etc\protocol AC6.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess AC6.exe File opened for modification C:\Windows\System32\drivers\etc\services AC6.exe File opened for modification C:\Windows\System32\drivers\etc\services.udacha AC6.exe -
Executes dropped EXE 17 IoCs
pid Process 2480 E8E4.exe 3880 FBB1.exe 3148 AC6.exe 3268 115E.exe 1192 1845.exe 488 schtasks.exe 1200 115E.exe 2696 DriverRealtekHDmaster.exe 2264 DriverMaster.exe 3800 1DF3.exe 3944 1845.exe 4216 2B42.exe 3016 1DF3.exe 4608 DriverRealtekHDmaster.exe 4812 EngineDriverMaster.exe 4300 spoolsv.exe 4548 sihost32.exe -
Modifies extensions of user files 53 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SetDisconnect.png.inprocess => C:\Users\Admin\Pictures\SetDisconnect.png.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\DebugTrace.tif.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\ResetRead.raw.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\UpdateStart.png => C:\Users\Admin\Pictures\UpdateStart.png.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\ResetGroup.png.udacha AC6.exe File renamed C:\Users\Admin\Pictures\SearchSelect.tif => C:\Users\Admin\Pictures\SearchSelect.tif.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\SearchSelect.tif.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\GrantMount.tif.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\InstallClear.crw.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\ResetGroup.png.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\UpdateStart.png.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\BlockImport.tiff.udacha AC6.exe File renamed C:\Users\Admin\Pictures\GrantMount.tif => C:\Users\Admin\Pictures\GrantMount.tif.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\InstallClear.crw => C:\Users\Admin\Pictures\InstallClear.crw.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\RenameGroup.raw.udacha AC6.exe File renamed C:\Users\Admin\Pictures\ResetGroup.png => C:\Users\Admin\Pictures\ResetGroup.png.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\BlockImport.tiff AC6.exe File renamed C:\Users\Admin\Pictures\ResetGroup.png.inprocess => C:\Users\Admin\Pictures\ResetGroup.png.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\UseExport.png.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\SearchSelect.tif.udacha AC6.exe File renamed C:\Users\Admin\Pictures\GrantMount.tif.inprocess => C:\Users\Admin\Pictures\GrantMount.tif.udacha AC6.exe File renamed C:\Users\Admin\Pictures\ImportEnter.raw.inprocess => C:\Users\Admin\Pictures\ImportEnter.raw.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\InstallClear.crw.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\ResetRead.raw => C:\Users\Admin\Pictures\ResetRead.raw.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\UseExport.png.inprocess => C:\Users\Admin\Pictures\UseExport.png.udacha AC6.exe File renamed C:\Users\Admin\Pictures\DebugTrace.tif.inprocess => C:\Users\Admin\Pictures\DebugTrace.tif.udacha AC6.exe File renamed C:\Users\Admin\Pictures\ImportEnter.raw => C:\Users\Admin\Pictures\ImportEnter.raw.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\MoveSave.crw.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\MoveSave.crw.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\SetDisconnect.png.udacha AC6.exe File renamed C:\Users\Admin\Pictures\BlockImport.tiff => C:\Users\Admin\Pictures\BlockImport.tiff.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\BlockImport.tiff.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\DebugTrace.tif.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\RenameGroup.raw => C:\Users\Admin\Pictures\RenameGroup.raw.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\DebugTrace.tif => C:\Users\Admin\Pictures\DebugTrace.tif.inprocess AC6.exe File opened for modification C:\Users\Admin\Pictures\UpdateStart.png.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\UseExport.png.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\GrantMount.tif.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\ImportEnter.raw.udacha AC6.exe File renamed C:\Users\Admin\Pictures\MoveSave.crw => C:\Users\Admin\Pictures\MoveSave.crw.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\MoveSave.crw.inprocess => C:\Users\Admin\Pictures\MoveSave.crw.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\ResetRead.raw.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\SetDisconnect.png.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\RenameGroup.raw.inprocess => C:\Users\Admin\Pictures\RenameGroup.raw.udacha AC6.exe File renamed C:\Users\Admin\Pictures\ResetRead.raw.inprocess => C:\Users\Admin\Pictures\ResetRead.raw.udacha AC6.exe File renamed C:\Users\Admin\Pictures\BlockImport.tiff.inprocess => C:\Users\Admin\Pictures\BlockImport.tiff.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\RenameGroup.raw.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\SetDisconnect.png => C:\Users\Admin\Pictures\SetDisconnect.png.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\UpdateStart.png.inprocess => C:\Users\Admin\Pictures\UpdateStart.png.udacha AC6.exe File renamed C:\Users\Admin\Pictures\UseExport.png => C:\Users\Admin\Pictures\UseExport.png.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\SearchSelect.tif.inprocess => C:\Users\Admin\Pictures\SearchSelect.tif.udacha AC6.exe File opened for modification C:\Users\Admin\Pictures\ImportEnter.raw.inprocess AC6.exe File renamed C:\Users\Admin\Pictures\InstallClear.crw.inprocess => C:\Users\Admin\Pictures\InstallClear.crw.udacha AC6.exe -
Deletes itself 1 IoCs
pid Process 3024 Process not Found -
Loads dropped DLL 5 IoCs
pid Process 2480 E8E4.exe 2480 E8E4.exe 2480 E8E4.exe 2480 E8E4.exe 2480 E8E4.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run AC6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\E8E4 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\E8E4 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\\E8E4.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Recovery\\WindowsRE\\conhost.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\spoolsv.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Mozilla Maintenance Service\\logs\\spoolsv.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Users\\Public\\Downloads\\dwm.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VSSVC = "\"C:\\Windows\\System32\\EditionUpgradeManagerObj\\VSSVC.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\VSSVC = "\"C:\\Windows\\System32\\EditionUpgradeManagerObj\\VSSVC.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vssadmin = "\"C:\\Boot\\cs-CZ\\vssadmin.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AC6 = "\"C:\\ProgramData\\Mozilla\\updates\\308046B0AF4A39CB\\AC6.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EngineDriverMaster = "\"C:\\PerfLogs\\EngineDriverMaster.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\AC6 = "\"C:\\ProgramData\\Mozilla\\updates\\308046B0AF4A39CB\\AC6.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AC6.exe\" e" AC6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\dllhost.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Recovery\\WindowsRE\\conhost.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\EngineDriverMaster = "\"C:\\PerfLogs\\EngineDriverMaster.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Users\\Public\\Downloads\\dwm.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\AC6 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\115E\\AC6.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AC6 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\115E\\AC6.exe\"" DriverRealtekHDmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\vssadmin = "\"C:\\Boot\\cs-CZ\\vssadmin.exe\"" DriverRealtekHDmaster.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-1594587808-2047097707-2163810515-1000\desktop.ini AC6.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\A: AC6.exe File opened (read-only) \??\B: AC6.exe File opened (read-only) \??\F: AC6.exe File opened (read-only) \??\I: AC6.exe File opened (read-only) \??\L: AC6.exe File opened (read-only) \??\S: AC6.exe File opened (read-only) \??\R: AC6.exe File opened (read-only) \??\E: Process not Found File opened (read-only) \??\F: schtasks.exe File opened (read-only) \??\h: cmd.exe File opened (read-only) \??\G: AC6.exe File opened (read-only) \??\H: AC6.exe File opened (read-only) \??\M: AC6.exe File opened (read-only) \??\P: AC6.exe File opened (read-only) \??\V: AC6.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\H: cmd.exe File opened (read-only) \??\J: AC6.exe File opened (read-only) \??\O: AC6.exe File opened (read-only) \??\T: AC6.exe File opened (read-only) \??\Z: AC6.exe File opened (read-only) \??\E: WerFault.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\N: AC6.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\Q: AC6.exe File opened (read-only) \??\X: AC6.exe File opened (read-only) \??\Y: AC6.exe File opened (read-only) \??\D: AC6.exe File opened (read-only) \??\E: AC6.exe File opened (read-only) \??\f: schtasks.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\K: AC6.exe File opened (read-only) \??\U: AC6.exe File opened (read-only) \??\W: AC6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 ip-api.com -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 97788398855708C0.inprocess AC6.exe File opened for modification C:\Windows\System32\Tasks\vssadmin AC6.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83 AC6.exe File opened for modification C:\Windows\System32\config\SECURITY AC6.exe File opened for modification C:\Windows\System32\config\RegBack\SECURITY AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.inprocess AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.udacha AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.inprocess AC6.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb AC6.exe File opened for modification C:\Windows\System32\config\RegBack\DEFAULT AC6.exe File opened for modification C:\Windows\System32\config\RegBack\SAM AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.udacha AC6.exe File opened for modification C:\Windows\System32\Tasks\conhost.inprocess AC6.exe File opened for modification C:\Windows\System32\config\SAM AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 AC6.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.udacha AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.inprocess AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.udacha AC6.exe File opened for modification C:\Windows\System32\config\COMPONENTS.udacha AC6.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\2adce956-0c74-47e9-8d83-3e951adefd07.udacha AC6.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 AC6.exe File opened for modification C:\Windows\System32\Tasks\dllhost.inprocess AC6.exe File opened for modification C:\Windows\System32\Tasks\dwm.udacha AC6.exe File opened for modification C:\Windows\System32\Tasks\vssadmin.udacha AC6.exe File opened for modification C:\Windows\System32\config\ELAM.inprocess AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9C237ECACBCB4101A3BE740DF0E53F83.udacha AC6.exe File opened for modification C:\Windows\System32\Tasks\VSSVC AC6.exe File opened for modification C:\Windows\System32\config\ELAM AC6.exe File opened for modification C:\Windows\System32\config\SYSTEM AC6.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\e6a14287-4b32-4edc-ac58-8de04ea6e0eb.inprocess AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 AC6.exe File opened for modification C:\Windows\System32\config\BBI AC6.exe File opened for modification C:\Windows\System32\Tasks\AC6 AC6.exe File opened for modification C:\Windows\System32\Tasks\AC6.udacha AC6.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb AC6.exe File opened for modification C:\Windows\System32\config\RegBack\SOFTWARE AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.udacha AC6.exe File created C:\Windows\System32\EditionUpgradeManagerObj\VSSVC.exe DriverRealtekHDmaster.exe File opened for modification C:\Windows\System32\config\COMPONENTS AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.udacha AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC.inprocess AC6.exe File opened for modification C:\Windows\System32\config\BCD-Template AC6.exe File opened for modification C:\Windows\System32\Tasks\dwm.inprocess AC6.exe File opened for modification C:\Windows\System32\Tasks\VSSVC.udacha AC6.exe File opened for modification C:\Windows\System32\config\SOFTWARE AC6.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.udacha AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6D1A73D92C4DC2751A4B5A2404E1BDCC.udacha AC6.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 97788398855708C0 AC6.exe File opened for modification C:\Windows\System32\Tasks\spoolsv.udacha AC6.exe File opened for modification C:\Windows\System32\config\DRIVERS AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead AC6.exe File opened for modification C:\Windows\System32\config\BCD-Template.inprocess AC6.exe File opened for modification C:\Windows\System32\EditionUpgradeManagerObj\59791dedea0f7b368ce35d2c1e2a738d66dd1c8e.inprocess AC6.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\2adce956-0c74-47e9-8d83-3e951adefd07 AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6D1A73D92C4DC2751A4B5A2404E1BDCC AC6.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6D1A73D92C4DC2751A4B5A2404E1BDCC.inprocess AC6.exe File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess AC6.exe File opened for modification C:\Windows\System32\Tasks\dllhost.udacha AC6.exe File opened for modification C:\Windows\System32\Tasks\dwm AC6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe 1192 1845.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 796 set thread context of 892 796 28ea220f0c8f906c66e1ab5657ca0260.exe 68 PID 3268 set thread context of 1200 3268 115E.exe 95 PID 1192 set thread context of 3944 1192 1845.exe 102 PID 3800 set thread context of 3016 3800 1DF3.exe 110 -
Drops file in Program Files directory 55 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess AC6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H AC6.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.udacha AC6.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess AC6.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 DriverRealtekHDmaster.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 AC6.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 AC6.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\spoolsv.exe DriverRealtekHDmaster.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 AC6.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\spoolsv.exe DriverRealtekHDmaster.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.udacha AC6.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V AC6.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete AC6.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.udacha AC6.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.udacha AC6.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess AC6.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.udacha AC6.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.inprocess AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile AC6.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.udacha AC6.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.udacha AC6.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.inprocess AC6.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C} AC6.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} AC6.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.udacha AC6.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\5940a34987c99120d96dace90a3f93f329dcad63.inprocess AC6.exe File opened for modification C:\Windows\Resources\Maps\mwconfig_client AC6.exe File created C:\Windows\SoftwareDistribution\DataStore\Logs\5940a34987c99120d96dace90a3f93f329dcad63 DriverRealtekHDmaster.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7} AC6.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.udacha AC6.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} AC6.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.udacha AC6.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D AC6.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.udacha AC6.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97} AC6.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.udacha AC6.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.udacha AC6.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100} AC6.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD AC6.exe File opened for modification C:\Windows\Panther\setupinfo AC6.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660} AC6.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE} AC6.exe File opened for modification C:\Windows\Boot\PCAT\bootnxt AC6.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.udacha AC6.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\5940a34987c99120d96dace90a3f93f329dcad63.udacha AC6.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.udacha AC6.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE} AC6.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.inprocess AC6.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10} AC6.exe File opened for modification C:\Windows\Boot\DVD\PCAT\BCD AC6.exe File created C:\Windows\SoftwareDistribution\DataStore\Logs\dllhost.exe DriverRealtekHDmaster.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0} AC6.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.inprocess AC6.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.udacha AC6.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.udacha AC6.exe File opened for modification C:\Windows\Boot\PCAT\bootmgr AC6.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state AC6.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180660}.udacha AC6.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.udacha AC6.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_cc51e87d-bda7-4ef7-80cf-c431fec6b805 AC6.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\5940a34987c99120d96dace90a3f93f329dcad63 AC6.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.udacha AC6.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.inprocess AC6.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F} AC6.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F}.udacha AC6.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_cc51e87d-bda7-4ef7-80cf-c431fec6b805.udacha AC6.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.inprocess AC6.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.udacha AC6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3756 1192 WerFault.exe 82 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28ea220f0c8f906c66e1ab5657ca0260.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28ea220f0c8f906c66e1ab5657ca0260.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28ea220f0c8f906c66e1ab5657ca0260.exe -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4520 schtasks.exe 4560 schtasks.exe 4596 schtasks.exe 5028 schtasks.exe 5064 schtasks.exe 2304 schtasks.exe 488 schtasks.exe 4320 schtasks.exe 4372 schtasks.exe 3932 schtasks.exe 4164 schtasks.exe 4212 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5036 timeout.exe -
Interacts with shadow copies 2 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4796 vssadmin.exe 4924 vssadmin.exe 5052 vssadmin.exe 420 vssadmin.exe 2012 vssadmin.exe 3164 vssadmin.exe 4164 vssadmin.exe 4336 vssadmin.exe 712 vssadmin.exe 1452 vssadmin.exe 3756 vssadmin.exe 504 vssadmin.exe 4672 vssadmin.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Process not Found Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 892 28ea220f0c8f906c66e1ab5657ca0260.exe 892 28ea220f0c8f906c66e1ab5657ca0260.exe 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 892 28ea220f0c8f906c66e1ab5657ca0260.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeBackupPrivilege 2680 vssvc.exe Token: SeRestorePrivilege 2680 vssvc.exe Token: SeAuditPrivilege 2680 vssvc.exe Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeDebugPrivilege 3268 115E.exe Token: 33 3268 115E.exe Token: SeIncBasePriorityPrivilege 3268 115E.exe Token: SeDebugPrivilege 1192 1845.exe Token: SeDebugPrivilege 2696 DriverRealtekHDmaster.exe Token: 33 2696 DriverRealtekHDmaster.exe Token: SeIncBasePriorityPrivilege 2696 DriverRealtekHDmaster.exe Token: SeRestorePrivilege 3756 WerFault.exe Token: SeBackupPrivilege 3756 WerFault.exe Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeDebugPrivilege 2264 DriverMaster.exe Token: SeDebugPrivilege 3756 WerFault.exe Token: SeDebugPrivilege 4608 DriverRealtekHDmaster.exe Token: 33 4608 DriverRealtekHDmaster.exe Token: SeIncBasePriorityPrivilege 4608 DriverRealtekHDmaster.exe Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeShutdownPrivilege 3024 Process not Found Token: SeCreatePagefilePrivilege 3024 Process not Found Token: SeDebugPrivilege 4300 spoolsv.exe Token: 33 4300 spoolsv.exe Token: SeIncBasePriorityPrivilege 4300 spoolsv.exe Token: SeDebugPrivilege 4812 EngineDriverMaster.exe Token: SeDebugPrivilege 3944 1845.exe Token: SeDebugPrivilege 1200 115E.exe Token: SeIncreaseQuotaPrivilege 4752 wmic.exe Token: SeSecurityPrivilege 4752 wmic.exe Token: SeTakeOwnershipPrivilege 4752 wmic.exe Token: SeLoadDriverPrivilege 4752 wmic.exe Token: SeSystemProfilePrivilege 4752 wmic.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found 3024 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3024 Process not Found 3024 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 796 wrote to memory of 892 796 28ea220f0c8f906c66e1ab5657ca0260.exe 68 PID 796 wrote to memory of 892 796 28ea220f0c8f906c66e1ab5657ca0260.exe 68 PID 796 wrote to memory of 892 796 28ea220f0c8f906c66e1ab5657ca0260.exe 68 PID 796 wrote to memory of 892 796 28ea220f0c8f906c66e1ab5657ca0260.exe 68 PID 796 wrote to memory of 892 796 28ea220f0c8f906c66e1ab5657ca0260.exe 68 PID 796 wrote to memory of 892 796 28ea220f0c8f906c66e1ab5657ca0260.exe 68 PID 3024 wrote to memory of 2480 3024 Process not Found 71 PID 3024 wrote to memory of 2480 3024 Process not Found 71 PID 3024 wrote to memory of 2480 3024 Process not Found 71 PID 3024 wrote to memory of 3880 3024 Process not Found 72 PID 3024 wrote to memory of 3880 3024 Process not Found 72 PID 3024 wrote to memory of 3880 3024 Process not Found 72 PID 3024 wrote to memory of 3148 3024 Process not Found 75 PID 3024 wrote to memory of 3148 3024 Process not Found 75 PID 3024 wrote to memory of 3268 3024 Process not Found 77 PID 3024 wrote to memory of 3268 3024 Process not Found 77 PID 3024 wrote to memory of 3268 3024 Process not Found 77 PID 3148 wrote to memory of 420 3148 AC6.exe 76 PID 3148 wrote to memory of 420 3148 AC6.exe 76 PID 3148 wrote to memory of 712 3148 AC6.exe 81 PID 3148 wrote to memory of 712 3148 AC6.exe 81 PID 3024 wrote to memory of 1192 3024 Process not Found 82 PID 3024 wrote to memory of 1192 3024 Process not Found 82 PID 3024 wrote to memory of 1192 3024 Process not Found 82 PID 3148 wrote to memory of 1452 3148 AC6.exe 84 PID 3148 wrote to memory of 1452 3148 AC6.exe 84 PID 3148 wrote to memory of 2012 3148 AC6.exe 86 PID 3148 wrote to memory of 2012 3148 AC6.exe 86 PID 3268 wrote to memory of 488 3268 115E.exe 136 PID 3268 wrote to memory of 488 3268 115E.exe 136 PID 3268 wrote to memory of 488 3268 115E.exe 136 PID 3148 wrote to memory of 3164 3148 AC6.exe 89 PID 3148 wrote to memory of 3164 3148 AC6.exe 89 PID 488 wrote to memory of 1044 488 schtasks.exe 91 PID 488 wrote to memory of 1044 488 schtasks.exe 91 PID 488 wrote to memory of 1044 488 schtasks.exe 91 PID 488 wrote to memory of 1172 488 schtasks.exe 93 PID 488 wrote to memory of 1172 488 schtasks.exe 93 PID 488 wrote to memory of 1172 488 schtasks.exe 93 PID 3268 wrote to memory of 1200 3268 115E.exe 95 PID 3268 wrote to memory of 1200 3268 115E.exe 95 PID 3268 wrote to memory of 1200 3268 115E.exe 95 PID 3268 wrote to memory of 1200 3268 115E.exe 95 PID 3268 wrote to memory of 1200 3268 115E.exe 95 PID 3268 wrote to memory of 1200 3268 115E.exe 95 PID 3268 wrote to memory of 1200 3268 115E.exe 95 PID 3268 wrote to memory of 1200 3268 115E.exe 95 PID 3148 wrote to memory of 3756 3148 AC6.exe 109 PID 3148 wrote to memory of 3756 3148 AC6.exe 109 PID 1044 wrote to memory of 2696 1044 cmd.exe 99 PID 1044 wrote to memory of 2696 1044 cmd.exe 99 PID 1172 wrote to memory of 2264 1172 cmd.exe 104 PID 1172 wrote to memory of 2264 1172 cmd.exe 104 PID 3024 wrote to memory of 3800 3024 Process not Found 100 PID 3024 wrote to memory of 3800 3024 Process not Found 100 PID 3024 wrote to memory of 3800 3024 Process not Found 100 PID 1192 wrote to memory of 3944 1192 1845.exe 102 PID 1192 wrote to memory of 3944 1192 1845.exe 102 PID 1192 wrote to memory of 3944 1192 1845.exe 102 PID 1192 wrote to memory of 3944 1192 1845.exe 102 PID 1192 wrote to memory of 3944 1192 1845.exe 102 PID 1192 wrote to memory of 3944 1192 1845.exe 102 PID 1192 wrote to memory of 3944 1192 1845.exe 102 PID 1192 wrote to memory of 3944 1192 1845.exe 102 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" AC6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\E8E4.exeC:\Users\Admin\AppData\Local\Temp\E8E4.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\E8E4.exe"2⤵
- Enumerates connected drives
PID:4924 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\FBB1.exeC:\Users\Admin\AppData\Local\Temp\FBB1.exe1⤵
- Executes dropped EXE
PID:3880
-
C:\Users\Admin\AppData\Local\Temp\AC6.exeC:\Users\Admin\AppData\Local\Temp\AC6.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3148 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:420
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:712
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1452
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2012
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3164
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:3756
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:504
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:4164
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4336
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4672
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4796
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:4924
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:5052
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:2860
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:4276
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:4400
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:4536
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\AC6.exe >> NUL2⤵PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\115E.exeC:\Users\Admin\AppData\Local\Temp\115E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\ProgramData\ZZZZZ.exe"C:\ProgramData\ZZZZZ.exe"2⤵PID:488
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exeC:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe"C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Program Files (x86)\Mozilla Maintenance Service\logs\spoolsv.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\DriverMaster.exeC:\Users\Admin\AppData\Local\Temp\DriverMaster.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit5⤵PID:4416
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'6⤵
- Creates scheduled task(s)
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit6⤵PID:4684
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'7⤵
- Creates scheduled task(s)
PID:4372
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"6⤵
- Executes dropped EXE
PID:4548
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\115E.exe"C:\Users\Admin\AppData\Local\Temp\115E.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
C:\Users\Admin\AppData\Local\Temp\1845.exeC:\Users\Admin\AppData\Local\Temp\1845.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\1845.exe"C:\Users\Admin\AppData\Local\Temp\1845.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 19082⤵
- Enumerates connected drives
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\1DF3.exeC:\Users\Admin\AppData\Local\Temp\1DF3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /fdsfs2⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\1DF3.exe"C:\Users\Admin\AppData\Local\Temp\1DF3.exe"2⤵
- Executes dropped EXE
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\2B42.exeC:\Users\Admin\AppData\Local\Temp\2B42.exe1⤵
- Executes dropped EXE
PID:4216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "E8E4" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\E8E4.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\DataStore\Logs\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "EngineDriverMaster" /sc ONLOGON /tr "'C:\PerfLogs\EngineDriverMaster.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Public\Downloads\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "AC6" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\115E\AC6.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Executes dropped EXE
- Creates scheduled task(s)
- Suspicious use of WriteProcessMemory
PID:488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "VSSVC" /sc ONLOGON /tr "'C:\Windows\System32\EditionUpgradeManagerObj\VSSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "vssadmin" /sc ONLOGON /tr "'C:\Boot\cs-CZ\vssadmin.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3932
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "AC6" /sc ONLOGON /tr "'C:\ProgramData\Mozilla\updates\308046B0AF4A39CB\AC6.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Enumerates connected drives
- Creates scheduled task(s)
PID:4164