Analysis
-
max time kernel
185s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
20-02-2022 05:02
Static task
static1
Behavioral task
behavioral1
Sample
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe
Resource
win10v2004-en-20220112
General
-
Target
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe
-
Size
385KB
-
MD5
3895a370b0c69c7e23ebb5ca1598525d
-
SHA1
0eea1b978df04a50f44657bbdc520905fdcd11cc
-
SHA256
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3
-
SHA512
bc87ca0f0a4ba081e92eaab959988f29c8c0d2d338a7d679025a3d4c5921d20856b55febcc41b19c67f6a5a9f8e89bb60a11e641f54d2de62949e37ce6305f1c
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
15FC73BdkpDMUWmxo7e7gtLRtM8gQgXyb4
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 1032 created 2632 1032 WerFault.exe 5 PID 3448 created 2804 3448 WerFault.exe 11 -
Executes dropped EXE 1 IoCs
pid Process 1476 uFeJb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation uFeJb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\uFeJb.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-PT\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\ado\msado21.tlb sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sv-SE\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsel.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml sihost.exe File opened for modification C:\Program Files\7-Zip\License.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\readme.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml sihost.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml sihost.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp sihost.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\ClearWrite.svg sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VGX\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\Services\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat sihost.exe File opened for modification C:\Program Files\Common Files\System\RyukReadMe.txt sihost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1860 2632 WerFault.exe 5 400 2804 WerFault.exe 11 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 50 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132899848519583261" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.314961" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4152" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.053610" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4340" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4344" svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1476 uFeJb.exe 1476 uFeJb.exe 400 WerFault.exe 1860 WerFault.exe 400 WerFault.exe 1860 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1476 uFeJb.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3908 wrote to memory of 1476 3908 85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe 79 PID 3908 wrote to memory of 1476 3908 85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe 79 PID 1476 wrote to memory of 696 1476 uFeJb.exe 81 PID 1476 wrote to memory of 696 1476 uFeJb.exe 81 PID 1476 wrote to memory of 2108 1476 uFeJb.exe 16 PID 696 wrote to memory of 2888 696 cmd.exe 83 PID 696 wrote to memory of 2888 696 cmd.exe 83 PID 1476 wrote to memory of 2128 1476 uFeJb.exe 4 PID 1476 wrote to memory of 2176 1476 uFeJb.exe 15 PID 1476 wrote to memory of 2436 1476 uFeJb.exe 13 PID 1476 wrote to memory of 2632 1476 uFeJb.exe 5 PID 1476 wrote to memory of 2804 1476 uFeJb.exe 11 PID 1476 wrote to memory of 2876 1476 uFeJb.exe 6 PID 1476 wrote to memory of 2952 1476 uFeJb.exe 10 PID 1476 wrote to memory of 1864 1476 uFeJb.exe 9 PID 1476 wrote to memory of 3344 1476 uFeJb.exe 7 PID 1476 wrote to memory of 1576 1476 uFeJb.exe 36 PID 1032 wrote to memory of 2632 1032 WerFault.exe 5 PID 1032 wrote to memory of 2632 1032 WerFault.exe 5 PID 3448 wrote to memory of 2804 3448 WerFault.exe 11 PID 3448 wrote to memory of 2804 3448 WerFault.exe 11
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup1⤵PID:2128
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2632
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2632 -s 9962⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2876
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3344
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1864
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2952
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2804
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2804 -s 26482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p1⤵PID:2436
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2176
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Drops file in Program Files directory
PID:2108
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe"C:\Users\Admin\AppData\Local\Temp\85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\users\Public\uFeJb.exe"C:\users\Public\uFeJb.exe" C:\Users\Admin\AppData\Local\Temp\85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\uFeJb.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\uFeJb.exe" /f4⤵
- Adds Run key to start application
PID:2888
-
-
-
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3172
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 2632 -ip 26321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:1032
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 540 -p 2804 -ip 28041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3448