Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
19-10-2021 05:55
Static task
static1
Behavioral task
behavioral1
Sample
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe
Resource
win10-en-20211014
General
-
Target
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe
-
Size
938KB
-
MD5
17b447b971a4977b2bfb2c28659aa1dd
-
SHA1
4af0fc90413fffcb4f73839adcae91ccdcc7c4f0
-
SHA256
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b
-
SHA512
a92fdc07cbf295bbf90174820a1a24b7909bd55845acd6f01ca36a2540aed822f6a9fca8d5d78052917b55355c65ad2a80cde03f285493277162691f51c39949
Malware Config
Extracted
C:\Users\Public\index.html
Extracted
C:\Users\Public\ATOMSILO-README.hta
atomsilo
Email:[email protected]
http://mhdehvkomeabau7gsetnsrhkfign4jgnx3wajth5yb5h6kvzbd72wlqd.onion
Signatures
-
AtomSilo
Ransomware family first seen in September 2021.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exedescription ioc process File opened for modification \??\c:\Users\Admin\Pictures\TestSkip.raw.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File renamed C:\Users\Admin\Pictures\UnprotectSave.raw => \??\c:\Users\Admin\Pictures\UnprotectSave.raw.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Users\Admin\Pictures\MountNew.tiff.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File renamed C:\Users\Admin\Pictures\StopMount.png => \??\c:\Users\Admin\Pictures\StopMount.png.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File renamed C:\Users\Admin\Pictures\TestSkip.raw => \??\c:\Users\Admin\Pictures\TestSkip.raw.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Users\Admin\Pictures\CompleteCompress.crw.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Users\Admin\Pictures\StopMount.png.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File renamed C:\Users\Admin\Pictures\UninstallBlock.tif => \??\c:\Users\Admin\Pictures\UninstallBlock.tif.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Users\Admin\Pictures\UninstallBlock.tif.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File renamed C:\Users\Admin\Pictures\CompleteCompress.crw => \??\c:\Users\Admin\Pictures\CompleteCompress.crw.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Users\Admin\Pictures\FormatPush.png.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File renamed C:\Users\Admin\Pictures\MountNew.tiff => \??\c:\Users\Admin\Pictures\MountNew.tiff.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File renamed C:\Users\Admin\Pictures\FormatPush.png => \??\c:\Users\Admin\Pictures\FormatPush.png.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Users\Admin\Pictures\UnprotectSave.raw.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1608 cmd.exe -
Drops file in Program Files directory 64 IoCs
Processes:
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exedescription ioc process File opened for modification \??\c:\Program Files\Java\jre7\lib\images\cursors\win32_LinkDrop32x32.gif.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00176_.GIF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01300_.GIF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Asia\Amman.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\LEVEL.INF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0291984.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\ADD.GIF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\InfoPathWelcomeImage.jpg.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGMARQ.DPV.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\7-Zip\Lang\br.txt.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21310_.GIF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107468.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107744.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME22.CSS.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.core.nl_ja_4.4.0.v20140623020002.jar.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14578_.GIF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLAPPT.FAE.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Montreal.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-sendopts_ja.jar.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02062U.BMP.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\THMBNAIL.PNG.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach.zh_CN_5.5.0.165303.jar.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh.htm.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.nl_zh_4.4.0.v20140623020002.jar.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE01160_.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\CircleIconsMask.bmp.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.bidi_0.10.0.v20130327-1442.jar.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-dialogs.xml.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107494.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD20013_.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.IT.XML.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Bahia_Banderas.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-heapwalker_zh_CN.jar.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files (x86)\Common Files\microsoft shared\VSTO\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099146.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0157167.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Riga.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Australia\Sydney.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-util-enumerations.xml.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Games\Solitaire\ja-JP\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21370_.GIF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-attach.jar.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files (x86)\Microsoft Office\MEDIA\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.AU.XML.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.model.workbench.nl_ja_4.4.0.v20140623020002.jar.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD09662_.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297725.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\URBAN_01.MID.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\distribute_form.gif.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00262_.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\README-FILE-JZCKHXIN-1634622912.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106124.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02749U.BMP.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Flow.eftx.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18247_.WMF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.nl_ja_4.4.0.v20140623020002.jar.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Asia\Oral.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe -
Processes:
mshta.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.execmd.exedescription pid process target process PID 1524 wrote to memory of 1108 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1108 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1108 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 2012 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 2012 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 2012 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1768 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1768 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1768 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 992 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 992 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 992 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1912 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1912 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1912 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 924 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 924 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 924 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1764 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1764 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1764 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 2036 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 2036 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 2036 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1708 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1708 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1708 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 892 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 892 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 892 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 1524 wrote to memory of 1608 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe cmd.exe PID 1524 wrote to memory of 1608 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe cmd.exe PID 1524 wrote to memory of 1608 1524 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe cmd.exe PID 1608 wrote to memory of 1924 1608 cmd.exe PING.EXE PID 1608 wrote to memory of 1924 1608 cmd.exe PING.EXE PID 1608 wrote to memory of 1924 1608 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe"C:\Users\Admin\AppData\Local\Temp\5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1108
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:2012
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1768
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:992
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1912
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:924
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1764
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:2036
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:1708
-
-
C:\Windows\system32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵
- Modifies Internet Explorer settings
PID:892
-
-
C:\Windows\system32\cmd.execmd /c ping 127.0.0.1 -n 6 && del "C:\Users\Admin\AppData\Local\Temp\5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 63⤵
- Runs ping.exe
PID:1924
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
aa93d342bd0f81cc147de7a280e022b2
SHA1d6d2ae4def8fa1414faba0cdbc031b5919bb43f9
SHA256a87a80d452899f4c98aee55cefcce897faca567e8e9763ed20f41f7dc7b48071
SHA512aeed5f93daebbec7241719a6903e0463e9d204f699d317adb498c6262dbecf61d68b1f77f6ec369ee45fe703a849086fbd407247fb021350fcec6a8b0950f375