Analysis
-
max time kernel
188s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
01-02-2022 15:20
Static task
static1
Behavioral task
behavioral1
Sample
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe
Resource
win10v2004-en-20220113
General
-
Target
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe
-
Size
678KB
-
MD5
b66384a34452aea03b6f53e0265f54e4
-
SHA1
727ecd6e6e3135c97d1d1de85f49a96f8355996d
-
SHA256
fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604
-
SHA512
51ae29b3f183171501d35383850dff4e87a2945d1f8c24aebff7035ea24f3b2507b2d2bb4532a5b71dee66fa1093722436844e5528fd47cb9f084ffde3249761
Malware Config
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker Payload 2 IoCs
resource yara_rule behavioral2/files/0x000700000001e7c5-130.dat family_medusalocker behavioral2/files/0x000700000001e7c5-131.dat family_medusalocker -
Executes dropped EXE 1 IoCs
pid Process 2080 svhost.exe -
Sets service image path in registry 2 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-1346565761-3498240568-4147300184-1000\desktop.ini fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\X: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\A: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\B: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\K: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\L: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\M: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\N: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\S: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\Q: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\W: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\E: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\G: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\H: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\J: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\O: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\P: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\Y: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\Z: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\F: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\I: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\R: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\T: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe File opened (read-only) \??\U: fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3612 wmic.exe Token: SeSecurityPrivilege 3612 wmic.exe Token: SeTakeOwnershipPrivilege 3612 wmic.exe Token: SeLoadDriverPrivilege 3612 wmic.exe Token: SeSystemProfilePrivilege 3612 wmic.exe Token: SeSystemtimePrivilege 3612 wmic.exe Token: SeProfSingleProcessPrivilege 3612 wmic.exe Token: SeIncBasePriorityPrivilege 3612 wmic.exe Token: SeCreatePagefilePrivilege 3612 wmic.exe Token: SeBackupPrivilege 3612 wmic.exe Token: SeRestorePrivilege 3612 wmic.exe Token: SeShutdownPrivilege 3612 wmic.exe Token: SeDebugPrivilege 3612 wmic.exe Token: SeSystemEnvironmentPrivilege 3612 wmic.exe Token: SeRemoteShutdownPrivilege 3612 wmic.exe Token: SeUndockPrivilege 3612 wmic.exe Token: SeManageVolumePrivilege 3612 wmic.exe Token: 33 3612 wmic.exe Token: 34 3612 wmic.exe Token: 35 3612 wmic.exe Token: 36 3612 wmic.exe Token: SeIncreaseQuotaPrivilege 408 wmic.exe Token: SeSecurityPrivilege 408 wmic.exe Token: SeTakeOwnershipPrivilege 408 wmic.exe Token: SeLoadDriverPrivilege 408 wmic.exe Token: SeSystemProfilePrivilege 408 wmic.exe Token: SeSystemtimePrivilege 408 wmic.exe Token: SeProfSingleProcessPrivilege 408 wmic.exe Token: SeIncBasePriorityPrivilege 408 wmic.exe Token: SeCreatePagefilePrivilege 408 wmic.exe Token: SeBackupPrivilege 408 wmic.exe Token: SeRestorePrivilege 408 wmic.exe Token: SeShutdownPrivilege 408 wmic.exe Token: SeDebugPrivilege 408 wmic.exe Token: SeSystemEnvironmentPrivilege 408 wmic.exe Token: SeRemoteShutdownPrivilege 408 wmic.exe Token: SeUndockPrivilege 408 wmic.exe Token: SeManageVolumePrivilege 408 wmic.exe Token: 33 408 wmic.exe Token: 34 408 wmic.exe Token: 35 408 wmic.exe Token: 36 408 wmic.exe Token: SeIncreaseQuotaPrivilege 1896 wmic.exe Token: SeSecurityPrivilege 1896 wmic.exe Token: SeTakeOwnershipPrivilege 1896 wmic.exe Token: SeLoadDriverPrivilege 1896 wmic.exe Token: SeSystemProfilePrivilege 1896 wmic.exe Token: SeSystemtimePrivilege 1896 wmic.exe Token: SeProfSingleProcessPrivilege 1896 wmic.exe Token: SeIncBasePriorityPrivilege 1896 wmic.exe Token: SeCreatePagefilePrivilege 1896 wmic.exe Token: SeBackupPrivilege 1896 wmic.exe Token: SeRestorePrivilege 1896 wmic.exe Token: SeShutdownPrivilege 1896 wmic.exe Token: SeDebugPrivilege 1896 wmic.exe Token: SeSystemEnvironmentPrivilege 1896 wmic.exe Token: SeRemoteShutdownPrivilege 1896 wmic.exe Token: SeUndockPrivilege 1896 wmic.exe Token: SeManageVolumePrivilege 1896 wmic.exe Token: 33 1896 wmic.exe Token: 34 1896 wmic.exe Token: 35 1896 wmic.exe Token: 36 1896 wmic.exe Token: SeShutdownPrivilege 2360 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3612 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 83 PID 4720 wrote to memory of 3612 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 83 PID 4720 wrote to memory of 3612 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 83 PID 4720 wrote to memory of 408 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 87 PID 4720 wrote to memory of 408 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 87 PID 4720 wrote to memory of 408 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 87 PID 4720 wrote to memory of 1896 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 89 PID 4720 wrote to memory of 1896 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 89 PID 4720 wrote to memory of 1896 4720 fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe 89 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe"C:\Users\Admin\AppData\Local\Temp\fdc208bac64cc29000dac8a0eb82c76133f3ba1ff162b01b3fb81b1751a51604.exe"1⤵
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4720 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe1⤵
- Executes dropped EXE
PID:2080
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 910d2f9fee8a41548482b97d4315217c E+3vzFTTNU60q6ZqLUKQRw.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
PID:2052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2360