Analysis
-
max time kernel
79s -
max time network
156s -
platform
windows11_x64 -
resource
win11 -
submitted
21-10-2021 17:46
Static task
static1
Behavioral task
behavioral1
Sample
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe
Resource
win11
General
-
Target
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe
-
Size
938KB
-
MD5
17b447b971a4977b2bfb2c28659aa1dd
-
SHA1
4af0fc90413fffcb4f73839adcae91ccdcc7c4f0
-
SHA256
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b
-
SHA512
a92fdc07cbf295bbf90174820a1a24b7909bd55845acd6f01ca36a2540aed822f6a9fca8d5d78052917b55355c65ad2a80cde03f285493277162691f51c39949
Malware Config
Extracted
C:\Users\Public\index.html
Extracted
C:\Users\Admin\Desktop\README-FILE-YJTUIPJF-1630767067.hta
atomsilo
Email:[email protected]
http://mhdehvkomeabau7gsetnsrhkfign4jgnx3wajth5yb5h6kvzbd72wlqd.onion
Extracted
C:\Users\Public\ATOMSILO-README.hta
atomsilo
Email:[email protected]
http://mhdehvkomeabau7gsetnsrhkfign4jgnx3wajth5yb5h6kvzbd72wlqd.onion
Signatures
-
AtomSilo
Ransomware family first seen in September 2021.
-
Drops startup file 1 IoCs
Processes:
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exedescription ioc process File created \??\c:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe -
Drops file in Program Files directory 64 IoCs
Processes:
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PREVIEWTEMPLATE2.POTX.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\ResiliencyLinks\VisualElements\SmallLogoDev.png.DATA.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_SubTrial-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Retail-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\WordR_OEM_Perp-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files (x86)\Common Files\Microsoft Shared\DAO\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\ResiliencyLinks\Locales\en-US.pak.DATA.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTest2-pl.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\Wordcnvpxy.cnv.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_KMS_Client-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Word2019R_OEM_Perp-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_KMS_Client_AE-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp3-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Windows.Photos_2020.20120.4004.0_x64__8wekyb3d8bbwe\PhotosApp\Assets\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-phn.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Fonts\private\DUBAI-REGULAR.TTF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\Views\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\fre\StartMenu_Win8.mp4.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Grace-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Windows Sidebar\Gadgets\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Retail-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_logo.png.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Templates\1033\PersonalMonthlyBudget.xltx.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vreg\office32mui.msi.16.en-us.vreg.dat.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\Locales\ja.pak.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\ResiliencyLinks\Trust Protection Lists\Mu\Other.DATA.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL002.XML.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\Templates\1033\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\FPA_f14\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\CardViewIcon.png.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Todos_0.48.41901.0_x64__8wekyb3d8bbwe\AppxMetadata\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTest-pl.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\PowerPivotExcelClientAddIn.tlb.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\tracedefinition130.xml.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_SubTrial-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_KMS_Client_AE-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\GRAPH_COL.HXC.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\msmdsrv.rll.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.147.37\NOTICE.TXT.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-ul-phn.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\rsod\wordmui.msi.16.en-us.tree.dat.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.YourPhone_1.21052.124.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml\Assets\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription1-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Retail-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Windows.Photos_2020.20120.4004.0_x64__8wekyb3d8bbwe\AppCS\Assets\MixedReality\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BOLDSTRI\BOLDSTRI.INF.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeWebView\Application\92.0.902.62\ResiliencyLinks\Locales\ro.pak.DATA.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\AccessRuntimeR_PrepidBypass-ppd.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\OpenSSL64.DllA\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linessimple.dotx.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib\utilities\groupedList\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\node_modules\@microsoft\load-themed-styles\lib\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\client-issuance-root-bridge-test.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-ul-oob.xrm-ms.ATOMSILO 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.People_10.1909.12456.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.21012.10511.0_neutral_split.scale-125_8wekyb3d8bbwe\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe File created \??\c:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.11.11591.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\README-FILE-YJTUIPJF-1630767067.hta 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "73" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 680 LogonUI.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.execmd.exedescription pid process target process PID 2576 wrote to memory of 2056 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2056 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2232 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2232 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 4324 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 4324 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2864 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2864 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2064 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2064 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 4796 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 4796 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2952 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2952 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2848 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2848 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2400 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 2400 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 3136 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 3136 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe mshta.exe PID 2576 wrote to memory of 3184 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe cmd.exe PID 2576 wrote to memory of 3184 2576 5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe cmd.exe PID 3184 wrote to memory of 4888 3184 cmd.exe PING.EXE PID 3184 wrote to memory of 4888 3184 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe"C:\Users\Admin\AppData\Local\Temp\5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe"1⤵
- Drops startup file
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2056
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2232
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:4324
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2064
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2952
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2848
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2400
-
-
C:\Windows\SYSTEM32\cmd.execmd /c ping 127.0.0.1 -n 6 && del "C:\Users\Admin\AppData\Local\Temp\5fa490668a9963e97d956f9a3b0c746b1d16eee9a73dfba875c9a3dc0e2c0d1b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 63⤵
- Runs ping.exe
PID:4888
-
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:3136
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:4796
-
-
C:\Windows\SYSTEM32\mshta.exemshta "C:\Users\Public\ATOMSILO-README.hta"2⤵PID:2864
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\README-FILE-YJTUIPJF-1630767067.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵PID:1468
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a5f855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
026d20369d9d0955f8fc36132bdab68c
SHA1aa0823dddfaf4fa1fefac6b848c29fcd23f6e231
SHA2564c2f8046e9a64de770649c7ffb76ab9f59ad821f80352beaad03e0c2b4b6eaa8
SHA512802e9636c71514276fa9f62cbb569b44ca70170c5b06779d9eeaf5ebb94141d69e46d590852c731cbf7122d904ce16154e9fbf41d1ce652187b3468f9c73b1c0
-
MD5
aa93d342bd0f81cc147de7a280e022b2
SHA1d6d2ae4def8fa1414faba0cdbc031b5919bb43f9
SHA256a87a80d452899f4c98aee55cefcce897faca567e8e9763ed20f41f7dc7b48071
SHA512aeed5f93daebbec7241719a6903e0463e9d204f699d317adb498c6262dbecf61d68b1f77f6ec369ee45fe703a849086fbd407247fb021350fcec6a8b0950f375