Analysis
-
max time kernel
162s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-02-2022 23:05
Static task
static1
Behavioral task
behavioral1
Sample
3935efdd48fc122e4b10c068f06c53e4360aeabdba3b70c7958af79a208fda58.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3935efdd48fc122e4b10c068f06c53e4360aeabdba3b70c7958af79a208fda58.dll
Resource
win10v2004-en-20220113
General
-
Target
3935efdd48fc122e4b10c068f06c53e4360aeabdba3b70c7958af79a208fda58.dll
-
Size
592KB
-
MD5
365d6a237322d9e9423c139618010221
-
SHA1
3f025bc6ad85e19a259c38e224ccd8e482645126
-
SHA256
3935efdd48fc122e4b10c068f06c53e4360aeabdba3b70c7958af79a208fda58
-
SHA512
4fa65fb387532b1e04e94b9d8996c937cd90205094b7e168d8feda1d28ae9b871b4e3eb10ceced13c49fea5daabd9d0a7a280c838ba4e2472c94e7ef29f8bc94
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6c2b0cc8d9154c1a
https://mazedecrypt.top/6c2b0cc8d9154c1a
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 1540 created 2156 1540 WerFault.exe 101 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\EnterCompress.crw => C:\Users\Admin\Pictures\EnterCompress.crw.s1nGYZ regsvr32.exe File renamed C:\Users\Admin\Pictures\SearchGroup.crw => C:\Users\Admin\Pictures\SearchGroup.crw.r0kG regsvr32.exe File opened for modification C:\Users\Admin\Pictures\UseFind.tiff regsvr32.exe File opened for modification C:\Users\Admin\Pictures\AssertConvert.tiff regsvr32.exe File renamed C:\Users\Admin\Pictures\AssertConvert.tiff => C:\Users\Admin\Pictures\AssertConvert.tiff.9bKmsO regsvr32.exe File renamed C:\Users\Admin\Pictures\SaveTest.raw => C:\Users\Admin\Pictures\SaveTest.raw.r0kG regsvr32.exe File renamed C:\Users\Admin\Pictures\UseFind.tiff => C:\Users\Admin\Pictures\UseFind.tiff.r0kG regsvr32.exe File renamed C:\Users\Admin\Pictures\CloseRequest.raw => C:\Users\Admin\Pictures\CloseRequest.raw.9bKmsO regsvr32.exe File renamed C:\Users\Admin\Pictures\JoinRename.raw => C:\Users\Admin\Pictures\JoinRename.raw.wJTITg0 regsvr32.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c2b0cc8d9154c1a.tmp regsvr32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6c2b0cc8d9154c1a.tmp regsvr32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 42 IoCs
description ioc Process File opened for modification C:\Program Files\SubmitGroup.M2TS regsvr32.exe File opened for modification C:\Program Files\UnprotectRevoke.vbs regsvr32.exe File opened for modification C:\Program Files (x86)\6c2b0cc8d9154c1a.tmp regsvr32.exe File opened for modification C:\Program Files\AssertLock.txt regsvr32.exe File opened for modification C:\Program Files\CompressClear.jtx regsvr32.exe File opened for modification C:\Program Files\HideCompare.dib regsvr32.exe File opened for modification C:\Program Files\RegisterUndo.css regsvr32.exe File opened for modification C:\Program Files\ConvertMount.scf regsvr32.exe File opened for modification C:\Program Files\FindRename.dxf regsvr32.exe File opened for modification C:\Program Files\LockRemove.tiff regsvr32.exe File opened for modification C:\Program Files\PingUnprotect.vb regsvr32.exe File opened for modification C:\Program Files\6c2b0cc8d9154c1a.tmp regsvr32.exe File opened for modification C:\Program Files\BackupUpdate.rar regsvr32.exe File opened for modification C:\Program Files\CompleteCopy.vst regsvr32.exe File opened for modification C:\Program Files\ConvertGet.vbe regsvr32.exe File opened for modification C:\Program Files\UnpublishSet.html regsvr32.exe File opened for modification C:\Program Files\RevokeSet.docx regsvr32.exe File opened for modification C:\Program Files\SetUndo.au regsvr32.exe File opened for modification C:\Program Files\ShowSwitch.jpg regsvr32.exe File opened for modification C:\Program Files\StopInstall.fon regsvr32.exe File opened for modification C:\Program Files\ClearTest.ram regsvr32.exe File opened for modification C:\Program Files\OpenPublish.ini regsvr32.exe File opened for modification C:\Program Files\ResumeCopy.cfg regsvr32.exe File opened for modification C:\Program Files\ShowPop.xml regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\AssertConfirm.7z regsvr32.exe File opened for modification C:\Program Files\ExpandSearch.mpa regsvr32.exe File opened for modification C:\Program Files\UnblockPop.wmf regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\AddAssert.i64 regsvr32.exe File opened for modification C:\Program Files\CompleteUnpublish.TTS regsvr32.exe File opened for modification C:\Program Files\ConnectSelect.m3u regsvr32.exe File opened for modification C:\Program Files\ShowStart.gif regsvr32.exe File opened for modification C:\Program Files\ConfirmResize.vdw regsvr32.exe File opened for modification C:\Program Files\GroupSplit.mpeg2 regsvr32.exe File opened for modification C:\Program Files\ConvertFromClose.png regsvr32.exe File opened for modification C:\Program Files\GroupJoin.MOD regsvr32.exe File opened for modification C:\Program Files\MoveMerge.mp2v regsvr32.exe File opened for modification C:\Program Files\OutUpdate.xsl regsvr32.exe File opened for modification C:\Program Files\ConfirmReceive.vsdx regsvr32.exe File opened for modification C:\Program Files\PingHide.gif regsvr32.exe File opened for modification C:\Program Files\ShowConfirm.reg regsvr32.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3384 2156 WerFault.exe 101 3636 2156 WerFault.exe 101 -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "6539" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2688" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2254" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2254" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "6539" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2254" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "879" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2688" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "879" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2688" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "6539" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "879" SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4732 regsvr32.exe 4732 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 57 IoCs
description pid Process Token: SeBackupPrivilege 4788 vssvc.exe Token: SeRestorePrivilege 4788 vssvc.exe Token: SeAuditPrivilege 4788 vssvc.exe Token: SeShutdownPrivilege 4200 svchost.exe Token: SeCreatePagefilePrivilege 4200 svchost.exe Token: SeShutdownPrivilege 4200 svchost.exe Token: SeCreatePagefilePrivilege 4200 svchost.exe Token: SeShutdownPrivilege 4200 svchost.exe Token: SeCreatePagefilePrivilege 4200 svchost.exe Token: SeIncreaseQuotaPrivilege 300 wmic.exe Token: SeSecurityPrivilege 300 wmic.exe Token: SeTakeOwnershipPrivilege 300 wmic.exe Token: SeLoadDriverPrivilege 300 wmic.exe Token: SeSystemProfilePrivilege 300 wmic.exe Token: SeSystemtimePrivilege 300 wmic.exe Token: SeProfSingleProcessPrivilege 300 wmic.exe Token: SeIncBasePriorityPrivilege 300 wmic.exe Token: SeCreatePagefilePrivilege 300 wmic.exe Token: SeBackupPrivilege 300 wmic.exe Token: SeRestorePrivilege 300 wmic.exe Token: SeShutdownPrivilege 300 wmic.exe Token: SeDebugPrivilege 300 wmic.exe Token: SeSystemEnvironmentPrivilege 300 wmic.exe Token: SeRemoteShutdownPrivilege 300 wmic.exe Token: SeUndockPrivilege 300 wmic.exe Token: SeManageVolumePrivilege 300 wmic.exe Token: 33 300 wmic.exe Token: 34 300 wmic.exe Token: 35 300 wmic.exe Token: 36 300 wmic.exe Token: SeIncreaseQuotaPrivilege 300 wmic.exe Token: SeSecurityPrivilege 300 wmic.exe Token: SeTakeOwnershipPrivilege 300 wmic.exe Token: SeLoadDriverPrivilege 300 wmic.exe Token: SeSystemProfilePrivilege 300 wmic.exe Token: SeSystemtimePrivilege 300 wmic.exe Token: SeProfSingleProcessPrivilege 300 wmic.exe Token: SeIncBasePriorityPrivilege 300 wmic.exe Token: SeCreatePagefilePrivilege 300 wmic.exe Token: SeBackupPrivilege 300 wmic.exe Token: SeRestorePrivilege 300 wmic.exe Token: SeShutdownPrivilege 300 wmic.exe Token: SeDebugPrivilege 300 wmic.exe Token: SeSystemEnvironmentPrivilege 300 wmic.exe Token: SeRemoteShutdownPrivilege 300 wmic.exe Token: SeUndockPrivilege 300 wmic.exe Token: SeManageVolumePrivilege 300 wmic.exe Token: 33 300 wmic.exe Token: 34 300 wmic.exe Token: 35 300 wmic.exe Token: 36 300 wmic.exe Token: SeTakeOwnershipPrivilege 2156 SearchApp.exe Token: SeRestorePrivilege 2156 SearchApp.exe Token: SeTakeOwnershipPrivilege 2156 SearchApp.exe Token: SeRestorePrivilege 2156 SearchApp.exe Token: SeTakeOwnershipPrivilege 2156 SearchApp.exe Token: SeRestorePrivilege 2156 SearchApp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2156 SearchApp.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1012 wrote to memory of 4732 1012 regsvr32.exe 82 PID 1012 wrote to memory of 4732 1012 regsvr32.exe 82 PID 1012 wrote to memory of 4732 1012 regsvr32.exe 82 PID 4732 wrote to memory of 300 4732 regsvr32.exe 99 PID 4732 wrote to memory of 300 4732 regsvr32.exe 99 PID 1540 wrote to memory of 2156 1540 WerFault.exe 101 PID 1540 wrote to memory of 2156 1540 WerFault.exe 101 PID 2156 wrote to memory of 3384 2156 SearchApp.exe 108 PID 2156 wrote to memory of 3384 2156 SearchApp.exe 108 PID 2156 wrote to memory of 3384 2156 SearchApp.exe 108
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3935efdd48fc122e4b10c068f06c53e4360aeabdba3b70c7958af79a208fda58.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3935efdd48fc122e4b10c068f06c53e4360aeabdba3b70c7958af79a208fda58.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\system32\wbem\wmic.exe"C:\obfkp\xj\..\..\Windows\asbji\..\system32\lbkj\wngb\..\..\wbem\knkbr\hhiig\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2156 -s 44602⤵
- Program crash
PID:3384
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2156 -s 44602⤵
- Program crash
PID:3636
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2184
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 2156 -ip 21561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:1540