Resubmissions
20/01/2022, 19:26
220120-x5jhrsbcdl 1017/01/2022, 16:56
220117-vf67esbcd8 1017/01/2022, 16:16
220117-tqyscsbedr 1009/12/2021, 23:18
211209-299yqseee9 1Analysis
-
max time kernel
614s -
max time network
613s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20/01/2022, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe
Resource
win10v2004-en-20220113
General
-
Target
3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe
-
Size
2.2MB
-
MD5
aea5d3cced6725f37e2c3797735e6467
-
SHA1
087497940a41d96e4e907b6dc92f75f4a38d861a
-
SHA256
3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83
-
SHA512
5489753ae1c3ba0dbd3e0ce1b78b0ccba045e534e77fb87c80d56b16229f928c46a15721020142bbc6bd4d1ba5c295f4bec3596efa7b46c906889c156dadbd66
Malware Config
Extracted
C:\RECOVER-sykffle-FILES.txt
http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21
http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=I2Bz00rK6fkXUoQuur4TTgimmKtGOY7E7vPSTRpLMtdcJORjeK56V2Ihp8exfrrQF0AwekitMld5dPD%2B5OoHEoHZ08%2FHwP3loiz0s3FfYW5HByxYyOJDiGWf%2Fni4GArvDFUB8S7tz9KNDdlACA5ocrQ6P%2FfKvWKojMNC8Kb%2BwDLAqTsD7vTsaIqcM7nbrB3NixH0XfbvT96ix56LoZfj7SM%2FTneVcDLe7uGxxP1Fk8vBbR586TX4rlkTITOSaWBHHFDokbXzuj1S9AMgfWRNB%2FJAlX0wWUe9LjoTbzrxQ1JzYy%2BhO8HMwQHbg9oYbeu%2Ft2PGmialmLXay6qmFtG0sw%3D%3D
Extracted
C:\Users\Default\Desktop\RECOVER-sykffle-FILES.txt
http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21
http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=PuYbvuWqm82inTx%2BR30ukdymXFnJt5ik6Hg7z6tl%2BURykiNjZXqFnb0cJE7%2FUQf3wQddW5Omw9cjD8vt6w61RkTDZ08XcQKe4QikIKFqh5mQJNRZ8ZU%2F6mBcntlSdfVup1STyCgYT2a1%2B9RBetFcMG8tnJfAD6JewbD7q4AZVg%2BBDni4NF%2BVxCT9swjoesVRdX%2FtoEpD6UAkc%2Bt4urXr217P0vNTCihZV1bVznP3kSMRbZa%2BqNULSj8BqsHjXgudpCgcRrw%2FIkcmKFvtyJEUhRMRiQF2VL5kv%2FGO%2BjuoxmnR9yQR6iPdFkWL4r9Ib7GAMhkmMq2vuB4P88WtPREEvg%3D%3D
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 19 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\StartUndo.tiff.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File renamed C:\Users\Admin\Pictures\UndoRepair.raw => C:\Users\Admin\Pictures\UndoRepair.raw.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\MeasureDebug.tiff 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\SkipPing.tiff 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\GrantAssert.crw.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File renamed C:\Users\Admin\Pictures\InitializeSet.raw => C:\Users\Admin\Pictures\InitializeSet.raw.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\InitializeSet.raw.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\UndoRepair.raw.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File renamed C:\Users\Admin\Pictures\GrantAssert.crw => C:\Users\Admin\Pictures\GrantAssert.crw.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File renamed C:\Users\Admin\Pictures\MeasureDebug.tiff => C:\Users\Admin\Pictures\MeasureDebug.tiff.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\SetRegister.raw.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\SkipPing.tiff.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File renamed C:\Users\Admin\Pictures\StartUndo.tiff => C:\Users\Admin\Pictures\StartUndo.tiff.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File renamed C:\Users\Admin\Pictures\GroupOut.png => C:\Users\Admin\Pictures\GroupOut.png.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\MeasureDebug.tiff.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File renamed C:\Users\Admin\Pictures\SkipPing.tiff => C:\Users\Admin\Pictures\SkipPing.tiff.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\StartUndo.tiff 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File opened for modification C:\Users\Admin\Pictures\GroupOut.png.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe File renamed C:\Users\Admin\Pictures\SetRegister.raw => C:\Users\Admin\Pictures\SetRegister.raw.sykffle 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\WallPaper = "C:\\Users\\Admin\\Desktop\\RECOVER-sykffle-FILES.txt.png" 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\RECOVER-sykffle-FILES.txt.png" 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe -
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1748 vssadmin.exe 1572 vssadmin.exe 1768 vssadmin.exe -
Modifies Control Panel 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\WallpaperStyle = "0" 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1252 NOTEPAD.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 4 IoCs
pid Process 584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 1864 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 932 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 932 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 836 WMIC.exe Token: SeSecurityPrivilege 836 WMIC.exe Token: SeTakeOwnershipPrivilege 836 WMIC.exe Token: SeLoadDriverPrivilege 836 WMIC.exe Token: SeSystemProfilePrivilege 836 WMIC.exe Token: SeSystemtimePrivilege 836 WMIC.exe Token: SeProfSingleProcessPrivilege 836 WMIC.exe Token: SeIncBasePriorityPrivilege 836 WMIC.exe Token: SeCreatePagefilePrivilege 836 WMIC.exe Token: SeBackupPrivilege 836 WMIC.exe Token: SeRestorePrivilege 836 WMIC.exe Token: SeShutdownPrivilege 836 WMIC.exe Token: SeDebugPrivilege 836 WMIC.exe Token: SeSystemEnvironmentPrivilege 836 WMIC.exe Token: SeRemoteShutdownPrivilege 836 WMIC.exe Token: SeUndockPrivilege 836 WMIC.exe Token: SeManageVolumePrivilege 836 WMIC.exe Token: 33 836 WMIC.exe Token: 34 836 WMIC.exe Token: 35 836 WMIC.exe Token: SeIncreaseQuotaPrivilege 836 WMIC.exe Token: SeSecurityPrivilege 836 WMIC.exe Token: SeTakeOwnershipPrivilege 836 WMIC.exe Token: SeLoadDriverPrivilege 836 WMIC.exe Token: SeSystemProfilePrivilege 836 WMIC.exe Token: SeSystemtimePrivilege 836 WMIC.exe Token: SeProfSingleProcessPrivilege 836 WMIC.exe Token: SeIncBasePriorityPrivilege 836 WMIC.exe Token: SeCreatePagefilePrivilege 836 WMIC.exe Token: SeBackupPrivilege 836 WMIC.exe Token: SeRestorePrivilege 836 WMIC.exe Token: SeShutdownPrivilege 836 WMIC.exe Token: SeDebugPrivilege 836 WMIC.exe Token: SeSystemEnvironmentPrivilege 836 WMIC.exe Token: SeRemoteShutdownPrivilege 836 WMIC.exe Token: SeUndockPrivilege 836 WMIC.exe Token: SeManageVolumePrivilege 836 WMIC.exe Token: 33 836 WMIC.exe Token: 34 836 WMIC.exe Token: 35 836 WMIC.exe Token: SeBackupPrivilege 1700 vssvc.exe Token: SeRestorePrivilege 1700 vssvc.exe Token: SeAuditPrivilege 1700 vssvc.exe Token: SeIncreaseQuotaPrivilege 1960 WMIC.exe Token: SeSecurityPrivilege 1960 WMIC.exe Token: SeTakeOwnershipPrivilege 1960 WMIC.exe Token: SeLoadDriverPrivilege 1960 WMIC.exe Token: SeSystemProfilePrivilege 1960 WMIC.exe Token: SeSystemtimePrivilege 1960 WMIC.exe Token: SeProfSingleProcessPrivilege 1960 WMIC.exe Token: SeIncBasePriorityPrivilege 1960 WMIC.exe Token: SeCreatePagefilePrivilege 1960 WMIC.exe Token: SeBackupPrivilege 1960 WMIC.exe Token: SeRestorePrivilege 1960 WMIC.exe Token: SeShutdownPrivilege 1960 WMIC.exe Token: SeDebugPrivilege 1960 WMIC.exe Token: SeSystemEnvironmentPrivilege 1960 WMIC.exe Token: SeRemoteShutdownPrivilege 1960 WMIC.exe Token: SeUndockPrivilege 1960 WMIC.exe Token: SeManageVolumePrivilege 1960 WMIC.exe Token: 33 1960 WMIC.exe Token: 34 1960 WMIC.exe Token: 35 1960 WMIC.exe Token: SeIncreaseQuotaPrivilege 1960 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 WORDPAD.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1544 WORDPAD.EXE 1544 WORDPAD.EXE 1544 WORDPAD.EXE 1544 WORDPAD.EXE 1544 WORDPAD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 568 wrote to memory of 584 568 cmd.exe 29 PID 568 wrote to memory of 584 568 cmd.exe 29 PID 568 wrote to memory of 584 568 cmd.exe 29 PID 568 wrote to memory of 584 568 cmd.exe 29 PID 568 wrote to memory of 1864 568 cmd.exe 30 PID 568 wrote to memory of 1864 568 cmd.exe 30 PID 568 wrote to memory of 1864 568 cmd.exe 30 PID 568 wrote to memory of 1864 568 cmd.exe 30 PID 568 wrote to memory of 1584 568 cmd.exe 33 PID 568 wrote to memory of 1584 568 cmd.exe 33 PID 568 wrote to memory of 1584 568 cmd.exe 33 PID 568 wrote to memory of 1584 568 cmd.exe 33 PID 1584 wrote to memory of 1628 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 34 PID 1584 wrote to memory of 1628 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 34 PID 1584 wrote to memory of 1628 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 34 PID 1584 wrote to memory of 1628 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 34 PID 1628 wrote to memory of 836 1628 cmd.exe 36 PID 1628 wrote to memory of 836 1628 cmd.exe 36 PID 1628 wrote to memory of 836 1628 cmd.exe 36 PID 1628 wrote to memory of 836 1628 cmd.exe 36 PID 1584 wrote to memory of 1952 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 38 PID 1584 wrote to memory of 1952 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 38 PID 1584 wrote to memory of 1952 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 38 PID 1584 wrote to memory of 1952 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 38 PID 1952 wrote to memory of 2020 1952 cmd.exe 40 PID 1952 wrote to memory of 2020 1952 cmd.exe 40 PID 1952 wrote to memory of 2020 1952 cmd.exe 40 PID 1952 wrote to memory of 2020 1952 cmd.exe 40 PID 1584 wrote to memory of 776 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 41 PID 1584 wrote to memory of 776 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 41 PID 1584 wrote to memory of 776 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 41 PID 1584 wrote to memory of 776 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 41 PID 776 wrote to memory of 1956 776 cmd.exe 43 PID 776 wrote to memory of 1956 776 cmd.exe 43 PID 776 wrote to memory of 1956 776 cmd.exe 43 PID 776 wrote to memory of 1956 776 cmd.exe 43 PID 1584 wrote to memory of 920 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 44 PID 1584 wrote to memory of 920 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 44 PID 1584 wrote to memory of 920 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 44 PID 1584 wrote to memory of 920 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 44 PID 1584 wrote to memory of 1796 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 45 PID 1584 wrote to memory of 1796 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 45 PID 1584 wrote to memory of 1796 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 45 PID 1584 wrote to memory of 1796 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 45 PID 920 wrote to memory of 1748 920 cmd.exe 48 PID 920 wrote to memory of 1748 920 cmd.exe 48 PID 920 wrote to memory of 1748 920 cmd.exe 48 PID 1796 wrote to memory of 1752 1796 cmd.exe 49 PID 1796 wrote to memory of 1752 1796 cmd.exe 49 PID 1796 wrote to memory of 1752 1796 cmd.exe 49 PID 1796 wrote to memory of 1752 1796 cmd.exe 49 PID 1584 wrote to memory of 1664 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 52 PID 1584 wrote to memory of 1664 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 52 PID 1584 wrote to memory of 1664 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 52 PID 1584 wrote to memory of 1664 1584 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 52 PID 1664 wrote to memory of 1764 1664 cmd.exe 53 PID 1664 wrote to memory of 1764 1664 cmd.exe 53 PID 1664 wrote to memory of 1764 1664 cmd.exe 53 PID 1664 wrote to memory of 1764 1664 cmd.exe 53 PID 568 wrote to memory of 932 568 cmd.exe 56 PID 568 wrote to memory of 932 568 cmd.exe 56 PID 568 wrote to memory of 932 568 cmd.exe 56 PID 568 wrote to memory of 932 568 cmd.exe 56 PID 932 wrote to memory of 1956 932 3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe"C:\Users\Admin\AppData\Local\Temp\3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe"1⤵PID:1600
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe --help2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe -a access_token -v -u2⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic csproduct get UUID"3⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get UUID4⤵
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "fsutil behavior set SymlinkEvaluation R2L:1"3⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\fsutil.exefsutil behavior set SymlinkEvaluation R2L:14⤵PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "fsutil behavior set SymlinkEvaluation R2R:1"3⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\fsutil.exefsutil behavior set SymlinkEvaluation R2R:14⤵PID:1956
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c "vssadmin.exe delete shadows /all /quiet"3⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1748
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f"3⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f4⤵PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "arp -a"3⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:1764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83.bin.exe -a access_token -v -u -l log.txt2⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic csproduct get UUID"3⤵PID:1956
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get UUID4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "fsutil behavior set SymlinkEvaluation R2L:1"3⤵PID:1772
-
C:\Windows\SysWOW64\fsutil.exefsutil behavior set SymlinkEvaluation R2L:14⤵PID:212
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "fsutil behavior set SymlinkEvaluation R2R:1"3⤵PID:220
-
C:\Windows\SysWOW64\fsutil.exefsutil behavior set SymlinkEvaluation R2R:14⤵PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f"3⤵PID:1616
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f4⤵PID:1504
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c "vssadmin.exe delete shadows /all /quiet"3⤵PID:1748
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1572
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "arp -a"3⤵PID:1992
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:548
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c "vssadmin.exe delete shadows /all /quiet"3⤵PID:1316
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1768
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:304
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1700
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1860
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f41⤵PID:216
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\log.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1252
-
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE"C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\AppData\Local\Temp\log.txt"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1544