Analysis
-
max time kernel
196s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
12-02-2022 00:32
Static task
static1
Behavioral task
behavioral1
Sample
4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe
Resource
win10v2004-en-20220112
General
-
Target
4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe
-
Size
1.3MB
-
MD5
2dc6efa90b95e2ddcb867a418a6f8e81
-
SHA1
de304a84bef4bc0b66df369ce855ff21a1e231cf
-
SHA256
4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e
-
SHA512
d7a7111d77734ce5f8f7291102166e9466f5206038d6c367bed0156df406f298f42ad270adae213d495fae6f300d8601ddff7e12d2617113755b73a4baa2fa2b
Malware Config
Signatures
-
Ouroboros/Zeropadypt
Ransomware family based on open-source CryptoWire.
-
Modifies Windows Firewall 1 TTPs
-
Drops desktop.ini file(s) 4 IoCs
Processes:
4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-790714498-1549421491-1643397139-1000\desktop.ini 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\desktop.ini 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File created C:\$Recycle.Bin\S-1-5-21-790714498-1549421491-1643397139-1000\desktop.ini 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File created C:\Program Files\desktop.ini 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
description flow ioc HTTP URL 65 http://www.sfml-dev.org/ip-provider.php -
Drops file in Program Files directory 64 IoCs
Processes:
4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exedescription ioc process File opened for modification C:\Program Files\7-Zip\readme.txt 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lt-LT\tipresx.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pl-pl.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pidgenx.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\zh-TW.pak 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msdaprsr.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File created C:\Program Files\7-Zip\Lang\fa.txt.[[email protected]][2KH9G0OTF7REC1Q].Encrypted 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\TipTsf.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVCatalog.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sr-latn-rs.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\TipTsf.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\rtscom.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcvbs.inc 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE.[[email protected]][2KH9G0OTF7REC1Q].Encrypted 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fi.pak 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Internet Explorer\images\bing.ico 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\ShapeCollector.exe.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File created C:\Program Files\7-Zip\Lang\ext.txt.[[email protected]][2KH9G0OTF7REC1Q].Encrypted 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RepoMan.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\ado\msado21.tlb 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File created C:\Program Files\7-Zip\Lang\ja.txt.[[email protected]][2KH9G0OTF7REC1Q].Encrypted 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\MountGet.xla.[[email protected]][2KH9G0OTF7REC1Q].Encrypted 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIntegration.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVManifest.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\he.pak 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaprst.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File created C:\Program Files\7-Zip\Lang\az.txt.[[email protected]][2KH9G0OTF7REC1Q].Encrypted 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ta.pak 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VGX\VGX.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\vstoee90.tlb 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msadcor.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tipresx.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\ado\msador28.tlb 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\tipresx.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_ca.xml 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ru.pak 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\iexplore.exe.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_kor.xml 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaremr.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sk-SK\tipresx.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\de.pak 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.he-il.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\IpsMigrationPlugin.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\UndoUnprotect.lnk.[[email protected]][2KH9G0OTF7REC1Q].Encrypted 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\Microsoft.Ink.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TipRes.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadds.dll 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe -
Drops file in Windows directory 3 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 48 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132892760678207922" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4224" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.448718" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4096" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe -
NTFS ADS 3 IoCs
Processes:
4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exedescription ioc process File opened for modification C:\Documents and Settings\S-1-5-21-790714498-1549421491-1643397139-1000\Ȼ8:✠Ő 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Documents and Settings\S-1-5-21-790714498-1549421491-1643397139-1000\볠Œsk8:봨Œ 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe File opened for modification C:\Documents and Settings\S-1-5-21-790714498-1549421491-1643397139-1000\de8:Œ 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exepid process 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
TiWorker.exedescription pid process Token: SeSecurityPrivilege 3044 TiWorker.exe Token: SeRestorePrivilege 3044 TiWorker.exe Token: SeBackupPrivilege 3044 TiWorker.exe Token: SeBackupPrivilege 3044 TiWorker.exe Token: SeRestorePrivilege 3044 TiWorker.exe Token: SeSecurityPrivilege 3044 TiWorker.exe Token: SeBackupPrivilege 3044 TiWorker.exe Token: SeRestorePrivilege 3044 TiWorker.exe Token: SeSecurityPrivilege 3044 TiWorker.exe Token: SeBackupPrivilege 3044 TiWorker.exe Token: SeRestorePrivilege 3044 TiWorker.exe Token: SeSecurityPrivilege 3044 TiWorker.exe Token: SeBackupPrivilege 3044 TiWorker.exe Token: SeRestorePrivilege 3044 TiWorker.exe Token: SeSecurityPrivilege 3044 TiWorker.exe Token: SeBackupPrivilege 3044 TiWorker.exe Token: SeRestorePrivilege 3044 TiWorker.exe Token: SeSecurityPrivilege 3044 TiWorker.exe Token: SeBackupPrivilege 3044 TiWorker.exe Token: SeRestorePrivilege 3044 TiWorker.exe Token: SeSecurityPrivilege 3044 TiWorker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.execmd.exenet.execmd.exenet.execmd.exenet.execmd.exenet.execmd.execmd.execmd.exenet.exedescription pid process target process PID 3912 wrote to memory of 3504 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 3504 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 3504 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3504 wrote to memory of 2584 3504 cmd.exe net.exe PID 3504 wrote to memory of 2584 3504 cmd.exe net.exe PID 3504 wrote to memory of 2584 3504 cmd.exe net.exe PID 2584 wrote to memory of 656 2584 net.exe net1.exe PID 2584 wrote to memory of 656 2584 net.exe net1.exe PID 2584 wrote to memory of 656 2584 net.exe net1.exe PID 3912 wrote to memory of 3028 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 3028 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 3028 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 204 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 204 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 204 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 1140 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 1140 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 1140 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 2308 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 2308 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 2308 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 2308 wrote to memory of 2944 2308 cmd.exe net.exe PID 2308 wrote to memory of 2944 2308 cmd.exe net.exe PID 2308 wrote to memory of 2944 2308 cmd.exe net.exe PID 2944 wrote to memory of 2696 2944 net.exe net1.exe PID 2944 wrote to memory of 2696 2944 net.exe net1.exe PID 2944 wrote to memory of 2696 2944 net.exe net1.exe PID 3912 wrote to memory of 1224 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 1224 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 1224 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 1224 wrote to memory of 3920 1224 cmd.exe net.exe PID 1224 wrote to memory of 3920 1224 cmd.exe net.exe PID 1224 wrote to memory of 3920 1224 cmd.exe net.exe PID 3920 wrote to memory of 3712 3920 net.exe net1.exe PID 3920 wrote to memory of 3712 3920 net.exe net1.exe PID 3920 wrote to memory of 3712 3920 net.exe net1.exe PID 3912 wrote to memory of 1836 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 1836 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 1836 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 1836 wrote to memory of 3412 1836 cmd.exe net.exe PID 1836 wrote to memory of 3412 1836 cmd.exe net.exe PID 1836 wrote to memory of 3412 1836 cmd.exe net.exe PID 3412 wrote to memory of 1572 3412 net.exe net1.exe PID 3412 wrote to memory of 1572 3412 net.exe net1.exe PID 3412 wrote to memory of 1572 3412 net.exe net1.exe PID 3912 wrote to memory of 3356 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 3356 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 3356 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3356 wrote to memory of 3620 3356 cmd.exe netsh.exe PID 3356 wrote to memory of 3620 3356 cmd.exe netsh.exe PID 3356 wrote to memory of 3620 3356 cmd.exe netsh.exe PID 3912 wrote to memory of 780 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 780 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 780 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 780 wrote to memory of 2416 780 cmd.exe netsh.exe PID 780 wrote to memory of 2416 780 cmd.exe netsh.exe PID 780 wrote to memory of 2416 780 cmd.exe netsh.exe PID 3912 wrote to memory of 2824 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 2824 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 3912 wrote to memory of 2824 3912 4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe cmd.exe PID 2824 wrote to memory of 3372 2824 cmd.exe net.exe PID 2824 wrote to memory of 3372 2824 cmd.exe net.exe PID 2824 wrote to memory of 3372 2824 cmd.exe net.exe PID 3372 wrote to memory of 3864 3372 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe"C:\Users\Admin\AppData\Local\Temp\4c2a849bc79e4114ddea304a330fcb50f256745e04595bbaef0857c60d65943e.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSDTC2⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\net.exenet stop MSDTC3⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSDTC4⤵PID:656
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled no2⤵PID:204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin delete catalog -quiet2⤵PID:1140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLSERVERAGENT2⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\net.exenet stop SQLSERVERAGENT3⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT4⤵PID:2696
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER2⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵PID:3712
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop vds2⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\net.exenet stop vds3⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vds4⤵PID:1572
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set currentprofile state off2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off3⤵PID:3620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable2⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLWriter2⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\net.exenet stop SQLWriter3⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter4⤵PID:3864
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLBrowser2⤵PID:2976
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser3⤵PID:1712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser4⤵PID:1552
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER2⤵PID:60
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵PID:3840
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQL$CONTOSO12⤵PID:3740
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$CONTOSO13⤵PID:1012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$CONTOSO14⤵PID:2588
-
-
-
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1852
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3044