Analysis
-
max time kernel
79s -
max time network
156s -
platform
windows11_x64 -
resource
win11 -
submitted
21-10-2021 17:46
Static task
static1
Behavioral task
behavioral1
Sample
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe
Resource
win11
General
-
Target
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe
-
Size
938KB
-
MD5
17b447b971a4977b2bfb2c28659aa1dd
-
SHA1
4af0fc90413fffcb4f73839adcae91ccdcc7c4f0
-
SHA256
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b
-
SHA512
a92fdc07cbf295bbf90174820a1a24b7909bd55845acd6f01ca36a2540aed822f6a9fca8d5d78052917b55355c65ad2a80cde03f285493277162691f51c39949
Malware Config
Extracted
C:\Users\Public\index.html
Extracted
C:\Users\Admin\Desktop\README-FILE-YJTUIPJF-1630767067.hta
atomsilo
Email:[email protected]
http://mhdehvkomeabau7gsetnsrhkfign4jgnx3wajth5yb5h6kvzbd72wlqd.onion
Extracted
C:\Users\Public\ATOMSILO-README.hta
atomsilo
Email:[email protected]
http://mhdehvkomeabau7gsetnsrhkfign4jgnx3wajth5yb5h6kvzbd72wlqd.onion
Signatures
-
AtomSilo
Ransomware family first seen in September 2021.
-
Drops startup file 1 IoCs
description ioc Process File created \??\c:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PREVIEWTEMPLATE2.POTX.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\ResiliencyLinks\VisualElements\SmallLogoDev.png.DATA.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_SubTrial-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Retail-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\WordR_OEM_Perp-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files (x86)\Common Files\Microsoft Shared\DAO\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\ResiliencyLinks\Locales\en-US.pak.DATA.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTest2-pl.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\Wordcnvpxy.cnv.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_KMS_Client-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Word2019R_OEM_Perp-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_KMS_Client_AE-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp3-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Windows.Photos_2020.20120.4004.0_x64__8wekyb3d8bbwe\PhotosApp\Assets\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-phn.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Fonts\private\DUBAI-REGULAR.TTF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\Views\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\fre\StartMenu_Win8.mp4.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Grace-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Windows Sidebar\Gadgets\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Retail-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_logo.png.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Templates\1033\PersonalMonthlyBudget.xltx.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vreg\office32mui.msi.16.en-us.vreg.dat.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\Locales\ja.pak.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\ResiliencyLinks\Trust Protection Lists\Mu\Other.DATA.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL002.XML.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\Templates\1033\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\FPA_f14\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\CardViewIcon.png.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Todos_0.48.41901.0_x64__8wekyb3d8bbwe\AppxMetadata\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTest-pl.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\PowerPivotExcelClientAddIn.tlb.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\tracedefinition130.xml.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_SubTrial-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_KMS_Client_AE-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\GRAPH_COL.HXC.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\msmdsrv.rll.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.147.37\NOTICE.TXT.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-ul-phn.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\rsod\wordmui.msi.16.en-us.tree.dat.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.YourPhone_1.21052.124.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml\Assets\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription1-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Retail-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Windows.Photos_2020.20120.4004.0_x64__8wekyb3d8bbwe\AppCS\Assets\MixedReality\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BOLDSTRI\BOLDSTRI.INF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeWebView\Application\92.0.902.62\ResiliencyLinks\Locales\ro.pak.DATA.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\AccessRuntimeR_PrepidBypass-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\OpenSSL64.DllA\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linessimple.dotx.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib\utilities\groupedList\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\node_modules\@microsoft\load-themed-styles\lib\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\client-issuance-root-bridge-test.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.People_10.1909.12456.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.21012.10511.0_neutral_split.scale-125_8wekyb3d8bbwe\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.11.11591.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "73" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4888 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 680 LogonUI.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2056 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 84 PID 2576 wrote to memory of 2056 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 84 PID 2576 wrote to memory of 2232 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 85 PID 2576 wrote to memory of 2232 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 85 PID 2576 wrote to memory of 4324 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 86 PID 2576 wrote to memory of 4324 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 86 PID 2576 wrote to memory of 2864 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 95 PID 2576 wrote to memory of 2864 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 95 PID 2576 wrote to memory of 2064 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 87 PID 2576 wrote to memory of 2064 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 87 PID 2576 wrote to memory of 4796 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 94 PID 2576 wrote to memory of 4796 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 94 PID 2576 wrote to memory of 2952 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 88 PID 2576 wrote to memory of 2952 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 88 PID 2576 wrote to memory of 2848 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 89 PID 2576 wrote to memory of 2848 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 89 PID 2576 wrote to memory of 2400 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 90 PID 2576 wrote to memory of 2400 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 90 PID 2576 wrote to memory of 3136 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 92 PID 2576 wrote to memory of 3136 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 92 PID 2576 wrote to memory of 3184 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 91 PID 2576 wrote to memory of 3184 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe 91 PID 3184 wrote to memory of 4888 3184 cmd.exe 96 PID 3184 wrote to memory of 4888 3184 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe"C:\Users\Admin\AppData\Local\Temp\5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe"1⤵
- Drops startup file
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2056
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2232
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:4324
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2064
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2952
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2848
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2400
-
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 127.0.0.1 -n 6 && del "C:\Users\Admin\AppData\Local\Temp\5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 63⤵
- Runs ping.exe
PID:4888
-
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:3136
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:4796
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2864
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\README-FILE-YJTUIPJF-1630767067.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵PID:1468
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a5f855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:680