General
Target

d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

Filesize

207KB

Completed

24-01-2022 01:09

Task

behavioral2

Score
10/10
MD5

8af4a97a5a07807277a02eb69a859120

SHA1

c9752d458c840ea4585efcdd16bbb5bf1a05ac44

SHA256

d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424

SHA256

c9e79390acf6245bb7936df92bf7bf560266c262199abb586a5d8f14d320a17a5a8ec3ff97efaeab11a12dc252f2fa2aaa185947faf40620b79a3bd3b4a8d393

Malware Config

Extracted

Path

C:\n429ay-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension n429ay. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C5C0530A6B3F84B4 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/C5C0530A6B3F84B4 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: Z+ciI4+3OQ0x+lL0CPZPBLlOAXeJEvWbRnCkoJId5zOm5doayySR53IvEb6jIrAY WC8Hjz7SoZH9pD7L+3QefWUrPxaA5y62EZ2Wra7DP23+paxHQDm8v07M2SAB10qH 8FD2abbfDtwG1YcrjN6mHVC7z3ZVzM6lINHKsoMkwv1FFxfv+5yreA2ADzeOdNZ2 crrnwttKSN46sVP6IgOU4XDvaLUiF4Tu7zKyDPiAbpxygaKFp56iQsda2U7moTOB 2oGRKhvRDtGsmf5s90dI/cXHEBCvOJBz3xegCNFMUYWVnVj5yIV18DJQ6KGztXjJ ImKHUYYVxmVMu7mS2j8fLyYlOR2fL0duFbSHnF6O+8ypviJp8K/vmucnxgOXs4tn qDwU4C9ockIOuZvBSQohd1DQXtBcUoIyYmiclFcjhfPgiN53MoHINZlxcB/iJQG5 vMGZfqQcA3aGfvWGGEBozDOqyp4MJh+nyUshzWQ8zS8PP+z5Ykn7nS7kmPaMvRfL AnzYQdhu/YHNtetsecfvS0dHieQSb5TKPK2YDmHK2GY8TcSgzb11dh2sNJvpjWoc OKDmVVOu1nKO8DFNaJQ2T7WZj+n0ZKxrOWLSIV8T6kggTC8SRUJ4AXgsYCDjO70+ /mlOGjB7k7w4cBEY2wAXG3hd6P+25Ecq1WpSAF76DqPNExjzAI6yv1ji+koHFFf8 EH6ttywVNpsYEDK7o+p+tbjO5NO4CEUPjctahxc2PEhoQ2mhuLQL1xRfGfxmGUfK rTtIelQn8DU/Th1KwmK8vi4WATgZux+276JNY9QJBjA54kcLSOt/Jy0YQYmBnojk lwoD0YsRYmJzC4dx5ySNepcXOUNJpS6oAhOP27k1mMBnHcpuuQRqqKw4Xn1VozJS eOE/jLnkNzAcTyBvXdum2kDHWLUE8Trr3lcEPiw7p2Fj2oQmmCL+z3/WwWsrsCPz Kckbes33fQz9SZOjo/I9UnsHnKqnOCf9kquUqS29rSU/bt88G3wBCJXsiUl9bP30 0S6qevqvApr43kCs44R+bt2QIHqJCgpleKdI3Mm7Frq9MeAim7q20NM5Lfv4UJof lzr6BnJVYCVahD7dw3L70bEoADrBBxn2ec3jnc5gIMZTlBFec4tjQjvmVqlRUIB7 9G5hncUVVD9am7UfNFqAOWIsFB0FSz0BNFk1IRvFZbFc7zVuNpxoxJOrGRe8OJXO eK52bg0k9l4CO39iQwBDvMxBGLVbTR0z4RrRJwTqAr/eiNWOV2zkKtxwsTnR6SAu Hl4f6VHV7mkTZHAnjliFkQ== ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C5C0530A6B3F84B4

http://decryptor.cc/C5C0530A6B3F84B4

Extracted

Family

sodinokibi

Botnet

$2a$10$EWjSpd.R6SAti4bgJBSw9er8oKv3V7/QblFqIXtPzaY2HzBNCquva

Campaign

3178

C2

tinyagency.com

oldschoolfun.net

anthonystreetrimming.com

botanicinnovations.com

thefixhut.com

polymedia.dk

reddysbakery.com

kindersitze-vergleich.de

theapifactory.com

partnertaxi.sk

deschl.net

gw2guilds.org

smartypractice.com

restaurantesszimmer.de

vitavia.lt

advizewealth.com

edelman.jp

fibrofolliculoma.info

zweerscreatives.nl

almosthomedogrescue.dog

charlesreger.com

manijaipur.com

blog.solutionsarchitect.guru

the-virtualizer.com

fairfriends18.de

tennisclubetten.nl

body-armour.online

aarvorg.com

rumahminangberdaya.com

sw1m.ru

macabaneaupaysflechois.com

themadbotter.com

maasreusel.nl

jadwalbolanet.info

advokathuset.dk

walter-lemm.de

securityfmm.com

smhydro.com.pl

citymax-cr.com

solinegraphic.com

abogadoengijon.es

jiloc.com

ziegler-praezisionsteile.de

argenblogs.com.ar

aprepol.com

petnest.ir

wasmachtmeinfonds.at

answerstest.ru

imperfectstore.com

nakupunafoundation.org

Attributes
net
true
pid
$2a$10$EWjSpd.R6SAti4bgJBSw9er8oKv3V7/QblFqIXtPzaY2HzBNCquva
prc
winword
excel
visio
oracle
isqlplussvc
firefox
dbeng50
mspub
xfssvccon
encsvc
dbsnmp
thebat
mydesktopservice
sql
steam
wordpad
infopath
agntsvc
synctime
outlook
ocautoupds
onenote
sqbcoreservice
ocomm
tbirdconfig
thunderbird
msaccess
powerpnt
ocssd
mydesktopqos
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
sub
3178
svc
memtas
mepocs
backup
sophos
sql
svc$
vss
veeam
Signatures 16

Filter: none

Collection
Credential Access
Defense Evasion
Discovery
Impact
Persistence
  • Modifies system executable filetype association
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    TTPs

    Modify RegistryChange Default File Association

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*"d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
  • Neshta

    Description

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Description

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Executes dropped EXE
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    Reported IOCs

    pidprocess
    2736d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
  • Modifies extensions of user files
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

    Reported IOCs

    descriptioniocprocess
    File opened for modification\??\c:\users\admin\pictures\SyncExport.tiffd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File renamedC:\Users\Admin\Pictures\ConvertToLock.tif => \??\c:\users\admin\pictures\ConvertToLock.tif.n429ayd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File renamedC:\Users\Admin\Pictures\FormatSplit.crw => \??\c:\users\admin\pictures\FormatSplit.crw.n429ayd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File renamedC:\Users\Admin\Pictures\ReceiveSkip.png => \??\c:\users\admin\pictures\ReceiveSkip.png.n429ayd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File renamedC:\Users\Admin\Pictures\SyncExport.tiff => \??\c:\users\admin\pictures\SyncExport.tiff.n429ayd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File renamedC:\Users\Admin\Pictures\UpdateDismount.raw => \??\c:\users\admin\pictures\UpdateDismount.raw.n429ayd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    TTPs

    Data from Local SystemCredentials in Files
  • Adds Run key to start application
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    TTPs

    Registry Run Keys / Startup FolderModify Registry

    Reported IOCs

    descriptioniocprocess
    Key created\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Rund62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\k51299BQXH = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe"d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
  • Enumerates connected drives
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query RegistryPeripheral Device DiscoverySystem Information Discovery

    Reported IOCs

    descriptioniocprocess
    File opened (read-only)\??\Q:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\S:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\X:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\Y:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\F:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\B:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\G:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\J:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\O:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\T:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\Z:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\A:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\I:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\K:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\P:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\R:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\U:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\V:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\W:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\E:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\D:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\L:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\M:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\N:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened (read-only)\??\H:d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
  • Sets desktop wallpaper using registry
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    Tags

    TTPs

    DefacementModify Registry

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\x13ke1265br2.bmp"d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
  • Drops file in Program Files directory
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\RedoTrace.pngd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\TestMeasure.mpgd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\UnprotectGet.mpeg3d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\LockRequest.docmd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\ReadUndo.kixd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\ShowDisable.docmd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ielowutil.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmplayer.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\MOZILL~1\MAINTE~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\WINDOW~2\wab.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmpconfig.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\ConvertReset.zipd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\ResetRepair.dotmd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\iexplore.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\WINDOW~2\wabmig.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File created\??\c:\program files (x86)\n429ay-readme.txtd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\RequestDebug.xmld62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Google\Update\DISABL~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\UnblockReceive.zipd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ExtExport.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\setup_wm.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmlaunch.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\RequestUndo.vdwd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\SetEnter.midd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ieinstal.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\MOZILL~1\UNINST~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmprph.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\PingGet.vssmd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\armsvc.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\InstallCompare.odtd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\OutBackup.potmd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\OutSync.tifd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\StopExport.jpgd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\UnblockDeny.phpd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\ConnectInstall.wmxd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modification\??\c:\program files\FormatTest.mp3d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\WINDOW~2\WinMail.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXEd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
  • Drops file in Windows directory
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Windows\svchost.comd62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
  • Enumerates physical storage devices

    Description

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    TTPs

    System Information Discovery
  • Modifies registry class
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*"d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
  • Suspicious behavior: EnumeratesProcesses
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exepowershell.exe

    Reported IOCs

    pidprocess
    2736d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    2736d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    4056powershell.exe
    4056powershell.exe
    4056powershell.exe
  • Suspicious use of AdjustPrivilegeToken
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exepowershell.exevssvc.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege2736d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    Token: SeDebugPrivilege4056powershell.exe
    Token: SeBackupPrivilege3776vssvc.exe
    Token: SeRestorePrivilege3776vssvc.exe
    Token: SeAuditPrivilege3776vssvc.exe
  • Suspicious use of WriteProcessMemory
    d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 4048 wrote to memory of 27364048d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    PID 4048 wrote to memory of 27364048d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    PID 4048 wrote to memory of 27364048d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exed62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    PID 2736 wrote to memory of 40562736d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exepowershell.exe
    PID 2736 wrote to memory of 40562736d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exepowershell.exe
Processes 5
  • C:\Users\Admin\AppData\Local\Temp\d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
    "C:\Users\Admin\AppData\Local\Temp\d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe"
    Modifies system executable filetype association
    Drops file in Program Files directory
    Drops file in Windows directory
    Modifies registry class
    Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Users\Admin\AppData\Local\Temp\3582-490\d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe"
      Executes dropped EXE
      Modifies extensions of user files
      Adds Run key to start application
      Enumerates connected drives
      Sets desktop wallpaper using registry
      Drops file in Program Files directory
      Suspicious behavior: EnumeratesProcesses
      Suspicious use of AdjustPrivilegeToken
      Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
        Suspicious behavior: EnumeratesProcesses
        Suspicious use of AdjustPrivilegeToken
        PID:4056
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    PID:3164
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    Suspicious use of AdjustPrivilegeToken
    PID:3776
Network
MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
    Execution
      Exfiltration
        Impact
        Initial Access
          Lateral Movement
            Privilege Escalation
              Replay Monitor
              00:00 00:00
              Downloads
              • C:\Users\Admin\AppData\Local\Temp\3582-490\d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

                MD5

                a055246b0e804eb3a1dda52937f556ef

                SHA1

                6807425e1252f1154664fc8072dde03558ed35fe

                SHA256

                a29f63484f53d2cf832b2bc70d6b66378b87b86221f885d0f43166503d631ef3

                SHA512

                18b2308905d95dff7a2a3e2cd3559325d6e3cfdeb45c48e3fd6df0fdbaee27ea3e191cc344505ad2e32f4136de6c8d2b2bbbac121486002707f1a617e2a49a95

              • C:\Users\Admin\AppData\Local\Temp\3582-490\d62240e4e9af350be38acaa7d0fb3d9d99224b5afb73130bfedd1d8ed913a424.exe

                MD5

                a055246b0e804eb3a1dda52937f556ef

                SHA1

                6807425e1252f1154664fc8072dde03558ed35fe

                SHA256

                a29f63484f53d2cf832b2bc70d6b66378b87b86221f885d0f43166503d631ef3

                SHA512

                18b2308905d95dff7a2a3e2cd3559325d6e3cfdeb45c48e3fd6df0fdbaee27ea3e191cc344505ad2e32f4136de6c8d2b2bbbac121486002707f1a617e2a49a95

              • memory/4056-124-0x0000021B7DEE0000-0x0000021B7E017000-memory.dmp

              • memory/4056-125-0x0000021B7DEE0000-0x0000021B7E017000-memory.dmp

              • memory/4056-126-0x0000021B7E650000-0x0000021B7E672000-memory.dmp

              • memory/4056-130-0x0000021B7F140000-0x0000021B7F1B6000-memory.dmp