Analysis
-
max time kernel
161s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 06:04
Static task
static1
Behavioral task
behavioral1
Sample
522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe
Resource
win10v2004-en-20220113
General
-
Target
522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe
-
Size
214KB
-
MD5
82663d9b96e1cb72bab78a9f56a50678
-
SHA1
29a5bd379073cd3073764a4f45fac283b0febcd2
-
SHA256
522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774
-
SHA512
3b2ba0a58482d310a4b3f044bfa88b5ce91b7a293e4241c8dc2e477029cd78e2df7d00dfee8b4213f87a26dce9c84e31807f8e503becbc64a97fe1f3bf5ac36c
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 1692 svchost.exe 2368 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\Run 522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\svchost.exe\" -start" 522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exedescription ioc process File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\M: svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 geoiptool.com -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\GRAY.pf svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\MANIFEST.MF.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.SF svchost.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\javafx-src.zip.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-lib-uihandler.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\currency.data svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\cacerts.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.beans.nl_zh_4.4.0.v20140623020002.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.nl_zh_4.4.0.v20140623020002.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\leftnav.gif.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_LinkDrop32x32.gif svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\dragHandle.png.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.core.nl_zh_4.4.0.v20140623020002.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_ja_4.4.0.v20140623020002.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\RegisterLimit.odt svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.xml.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.updatechecker.nl_zh_4.4.0.v20140623020002.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.RSA.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.nl_ja_4.4.0.v20140623020002.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fontconfig.properties.src.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.views.nl_ja_4.4.0.v20140623020002.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\release.@payransom500 .106-812-35C svchost.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\MANIFEST.MF.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.configuration_5.5.0.165303.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core.xml.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\UnprotectApprove.ex_.@payransom500 .106-812-35C svchost.exe File created C:\Program Files\Internet Explorer\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.addons.swt.nl_ja_4.4.0.v20140623020002.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_zh_4.4.0.v20140623020002.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-sampler.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\accessibility.properties svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.xml svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\artifacts.xml.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-core.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\LICENSE.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.SF.@payransom500 .106-812-35C svchost.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_fr.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\blacklisted.certs svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\COPYRIGHT svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_zh_CN.properties.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.sun.el_2.2.0.v201303151357.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\date-span-16.png.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\keytool.exe.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.forms_3.6.100.v20140422-1825.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.metadata.repository.prefs svchost.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.greychart.ui.ja_5.5.0.165303.jar.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4.ssl_1.0.0.v20140827-1444.jar svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt.@payransom500 .106-812-35C svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jdwpTransport.h.@payransom500 .106-812-35C svchost.exe -
Drops file in Windows directory 8 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 4028 powershell.exe 4028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 3680 svchost.exe Token: SeCreatePagefilePrivilege 3680 svchost.exe Token: SeShutdownPrivilege 3680 svchost.exe Token: SeCreatePagefilePrivilege 3680 svchost.exe Token: SeShutdownPrivilege 3680 svchost.exe Token: SeCreatePagefilePrivilege 3680 svchost.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe Token: SeRestorePrivilege 1700 TiWorker.exe Token: SeSecurityPrivilege 1700 TiWorker.exe Token: SeBackupPrivilege 1700 TiWorker.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exesvchost.execmd.execmd.exedescription pid process target process PID 4072 wrote to memory of 1692 4072 522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe svchost.exe PID 4072 wrote to memory of 1692 4072 522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe svchost.exe PID 4072 wrote to memory of 1692 4072 522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe svchost.exe PID 1692 wrote to memory of 4408 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 4408 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 4408 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 1660 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 1660 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 1660 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 1828 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 1828 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 1828 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 3592 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 3592 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 3592 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 2756 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 2756 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 2756 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 2780 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 2780 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 2780 1692 svchost.exe cmd.exe PID 1692 wrote to memory of 2368 1692 svchost.exe svchost.exe PID 1692 wrote to memory of 2368 1692 svchost.exe svchost.exe PID 1692 wrote to memory of 2368 1692 svchost.exe svchost.exe PID 4408 wrote to memory of 3208 4408 cmd.exe WMIC.exe PID 4408 wrote to memory of 3208 4408 cmd.exe WMIC.exe PID 4408 wrote to memory of 3208 4408 cmd.exe WMIC.exe PID 2780 wrote to memory of 4028 2780 cmd.exe powershell.exe PID 2780 wrote to memory of 4028 2780 cmd.exe powershell.exe PID 2780 wrote to memory of 4028 2780 cmd.exe powershell.exe PID 2780 wrote to memory of 1712 2780 cmd.exe WMIC.exe PID 2780 wrote to memory of 1712 2780 cmd.exe WMIC.exe PID 2780 wrote to memory of 1712 2780 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe"C:\Users\Admin\AppData\Local\Temp\522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy ByPass -Command "Get-WmiObject Win32_Shadowcopy | ForEach-Object {$_.Delete();}"4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC.exe shadowcopy delete /nointeractive4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CBMD5
9eb7ce9761202f845d2e6dd6a5d38c64
SHA1f1d6b983f61571913df7c347ed6380f49b3e6ae5
SHA256e3c600d6a414bc83b7a0d9920f0c1d41f962c55dc8fa966fcadc927461a6f7cf
SHA512ec25fe836cfd4b9f0d1e12250e071ba84409361f67925057c1e7cd609a1ac891b1bbae164d28df8456d5a700c600403184fcaa7b277ebefb5889fe603d89cda1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEEMD5
5bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B1230D967FD647CD5194F3FFA6C7E7E4MD5
f6fc284186499b1ec74e7b0e97540cb8
SHA136f163f8543d1cd0c4a36ed9cbf4aecaf2d382af
SHA25609420bf65f3acdd595e388a9331e127003da5eb0520e86d9f27dcaf55b713192
SHA512689e2aa233815780a2ad015e18d06dd47d2768cd08f0d30ccfdbe66382e4a3c76d1f421c099874b8cfb9ec70905e7175c6b24884579dd3b7b9d2ccb6051248a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
b0f8c16035b066b326999c9f26422098
SHA1389a9e669628fcbedc35d908dcd4675f8dba9e79
SHA2564c0c8af07363f3d178b6dd9ae0def73e9fbec4df49a8ab1dcf60d37ead768d78
SHA51254ee8966beccd0ad9e9650b91191eca726a5b37e86fcabd75b41f8f0544b2328f9e2bbd2ff3e9e2098feaa36f6a769e9367db2f6f74e9910be0d3b5a29081369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CBMD5
b8e20e62eef9cd25837d3fe341c933c7
SHA1a0b4e4091acb21ce4b5d81c449f740d0fa50bb5f
SHA25667ba58fbf3d6e64374b01e2b2b5579233cc7650ed05dd055a2f962b73ac5e01b
SHA51213b38acddb33d1ca2ed7bf0d69eb0cdb862f5c4c9a1668ec642ea157f7893672ecbe9096e7d4e7c47007811d88f12bb3cb2f90848e3747b2f30a6f2e73471238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEEMD5
d417aa085a9594a69b9e4762fd32b15b
SHA1b46a2912c5fa9c58c80628a49f782705a2a7ff41
SHA256dcbfd588ca2ea7dc0ee168ae4e835549b9db850923b1fe72063824bd2523ef0c
SHA51264f9fab6ede543a1a62d8e482b7ead4d3cb6ddb6572e8b0971ea70d9f02efbfe33605948716060a0d6b717dbe1a22d95cdfbb3a72e7466bd79127bf0c81f1b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B1230D967FD647CD5194F3FFA6C7E7E4MD5
8b53f04a2ee2664ee7dd9201f01c698d
SHA1dbf17228c52a9baf8b422e57abda31423c591a18
SHA256f820b4e016ed9ddc28e640bf48ba3d81fdf991bf2f81d715f86fc7210b596b9a
SHA512dceb7495cd49e11c752ef2666e918261fac9d29df99219e09d7b711dfeb8c50ab486e990aa0a372bcd2a541453f74e13c3f387a939496cad4567453c7572eb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
86f8345dc4d3a092871cad207d606c46
SHA1100b670e62343e74f56168083432dc9f97a4f939
SHA256050d1939d836d5453141bc131bad27f1dc997521c7ccee2cc4bcb789af1f72ea
SHA512ecc1c1ec16bbf32511a3802df05ddadcde60adc3fe255e782a2988ff7ed65cd59d2ee83a974be45c4a23231d5c1c9c6b1cdc63a108749c431d2a1b94a4827631
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K6H59MEI\DYSYYABC.htmMD5
b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OMK7HR9K\LVU1ZDUG.htmMD5
6b17a59cec1a7783febae9aa55c56556
SHA101d4581e2b3a6348679147a915a0b22b2a66643a
SHA25666987b14b90d41632be98836f9601b12e7f329ffab05595887889c9c5716fbeb
SHA5123337efd12b9c06b7768eb928a78caae243b75257c5aabe7a49e908a2f735af55f7257a40bd2330dc13865ead18ed805b54a6c5105740fdcbbaccacf7997bcbc3
-
C:\Users\Admin\AppData\Local\Temp\~temp001.batMD5
e6545ccb3660f88529716ed4e647c713
SHA1ecd628f29985599a24c5c1d23083c689917dd74e
SHA256e802bf0c4481bef693d4d1f307aba48301e330d3728dd46a4ec97c4a96b4d4a7
SHA512f745e7d5dd006083234e783dd5dc7fb83043a7d0479ea2a91a2ddbc8c20ca47343516efbd155271768c675a22b32e88febdfe51551ec42dfdb64805c62c3188d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exeMD5
82663d9b96e1cb72bab78a9f56a50678
SHA129a5bd379073cd3073764a4f45fac283b0febcd2
SHA256522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774
SHA5123b2ba0a58482d310a4b3f044bfa88b5ce91b7a293e4241c8dc2e477029cd78e2df7d00dfee8b4213f87a26dce9c84e31807f8e503becbc64a97fe1f3bf5ac36c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exeMD5
82663d9b96e1cb72bab78a9f56a50678
SHA129a5bd379073cd3073764a4f45fac283b0febcd2
SHA256522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774
SHA5123b2ba0a58482d310a4b3f044bfa88b5ce91b7a293e4241c8dc2e477029cd78e2df7d00dfee8b4213f87a26dce9c84e31807f8e503becbc64a97fe1f3bf5ac36c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exeMD5
82663d9b96e1cb72bab78a9f56a50678
SHA129a5bd379073cd3073764a4f45fac283b0febcd2
SHA256522d6e25e6b7062786b699c76d46c2a510d94ca0760447a1d0951a6718fc9774
SHA5123b2ba0a58482d310a4b3f044bfa88b5ce91b7a293e4241c8dc2e477029cd78e2df7d00dfee8b4213f87a26dce9c84e31807f8e503becbc64a97fe1f3bf5ac36c
-
memory/3680-144-0x0000017398AC0000-0x0000017398AC4000-memory.dmpFilesize
16KB
-
memory/3680-143-0x0000017395DA0000-0x0000017395DB0000-memory.dmpFilesize
64KB
-
memory/3680-142-0x0000017395D40000-0x0000017395D50000-memory.dmpFilesize
64KB
-
memory/4028-153-0x0000000005800000-0x0000000005866000-memory.dmpFilesize
408KB
-
memory/4028-154-0x0000000005870000-0x00000000058D6000-memory.dmpFilesize
408KB
-
memory/4028-149-0x0000000002700000-0x0000000002701000-memory.dmpFilesize
4KB
-
memory/4028-150-0x0000000002702000-0x0000000002703000-memory.dmpFilesize
4KB
-
memory/4028-151-0x00000000050D0000-0x00000000056F8000-memory.dmpFilesize
6.2MB
-
memory/4028-152-0x0000000004F00000-0x0000000004F22000-memory.dmpFilesize
136KB
-
memory/4028-147-0x00000000734CE000-0x00000000734CF000-memory.dmpFilesize
4KB
-
memory/4028-148-0x0000000002560000-0x0000000002596000-memory.dmpFilesize
216KB
-
memory/4028-155-0x0000000005E40000-0x0000000005E5E000-memory.dmpFilesize
120KB
-
memory/4028-156-0x0000000002705000-0x0000000002707000-memory.dmpFilesize
8KB
-
memory/4028-157-0x00000000070A0000-0x0000000007136000-memory.dmpFilesize
600KB
-
memory/4028-158-0x0000000006390000-0x00000000063AA000-memory.dmpFilesize
104KB
-
memory/4028-159-0x0000000006410000-0x0000000006432000-memory.dmpFilesize
136KB
-
memory/4028-160-0x00000000076F0000-0x0000000007C94000-memory.dmpFilesize
5.6MB