Analysis
-
max time kernel
185s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
20-02-2022 05:02
Static task
static1
Behavioral task
behavioral1
Sample
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe
Resource
win10v2004-en-20220112
General
-
Target
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe
-
Size
385KB
-
MD5
3895a370b0c69c7e23ebb5ca1598525d
-
SHA1
0eea1b978df04a50f44657bbdc520905fdcd11cc
-
SHA256
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3
-
SHA512
bc87ca0f0a4ba081e92eaab959988f29c8c0d2d338a7d679025a3d4c5921d20856b55febcc41b19c67f6a5a9f8e89bb60a11e641f54d2de62949e37ce6305f1c
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
15FC73BdkpDMUWmxo7e7gtLRtM8gQgXyb4
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 1032 created 2632 1032 WerFault.exe DllHost.exe PID 3448 created 2804 3448 WerFault.exe StartMenuExperienceHost.exe -
Executes dropped EXE 1 IoCs
Processes:
uFeJb.exepid process 1476 uFeJb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exeuFeJb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation uFeJb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\users\\Public\\uFeJb.exe" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
sihost.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-PT\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\ado\msado21.tlb sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sv-SE\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsel.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml sihost.exe File opened for modification C:\Program Files\7-Zip\License.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\readme.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml sihost.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml sihost.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp sihost.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\ClearWrite.svg sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.man sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt sihost.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VGX\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\Common Files\Services\RyukReadMe.txt sihost.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm sihost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat sihost.exe File opened for modification C:\Program Files\Common Files\System\RyukReadMe.txt sihost.exe -
Drops file in Windows directory 3 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1860 2632 WerFault.exe DllHost.exe 400 2804 WerFault.exe StartMenuExperienceHost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 50 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132899848519583261" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.314961" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4152" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.053610" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4340" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4344" svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
uFeJb.exeWerFault.exeWerFault.exepid process 1476 uFeJb.exe 1476 uFeJb.exe 400 WerFault.exe 1860 WerFault.exe 400 WerFault.exe 1860 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
uFeJb.exeTiWorker.exedescription pid process Token: SeDebugPrivilege 1476 uFeJb.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe Token: SeBackupPrivilege 3028 TiWorker.exe Token: SeRestorePrivilege 3028 TiWorker.exe Token: SeSecurityPrivilege 3028 TiWorker.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exeuFeJb.execmd.exeWerFault.exeWerFault.exedescription pid process target process PID 3908 wrote to memory of 1476 3908 85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe uFeJb.exe PID 3908 wrote to memory of 1476 3908 85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe uFeJb.exe PID 1476 wrote to memory of 696 1476 uFeJb.exe cmd.exe PID 1476 wrote to memory of 696 1476 uFeJb.exe cmd.exe PID 1476 wrote to memory of 2108 1476 uFeJb.exe sihost.exe PID 696 wrote to memory of 2888 696 cmd.exe reg.exe PID 696 wrote to memory of 2888 696 cmd.exe reg.exe PID 1476 wrote to memory of 2128 1476 uFeJb.exe svchost.exe PID 1476 wrote to memory of 2176 1476 uFeJb.exe taskhostw.exe PID 1476 wrote to memory of 2436 1476 uFeJb.exe svchost.exe PID 1476 wrote to memory of 2632 1476 uFeJb.exe DllHost.exe PID 1476 wrote to memory of 2804 1476 uFeJb.exe StartMenuExperienceHost.exe PID 1476 wrote to memory of 2876 1476 uFeJb.exe RuntimeBroker.exe PID 1476 wrote to memory of 2952 1476 uFeJb.exe SearchApp.exe PID 1476 wrote to memory of 1864 1476 uFeJb.exe RuntimeBroker.exe PID 1476 wrote to memory of 3344 1476 uFeJb.exe RuntimeBroker.exe PID 1476 wrote to memory of 1576 1476 uFeJb.exe RuntimeBroker.exe PID 1032 wrote to memory of 2632 1032 WerFault.exe DllHost.exe PID 1032 wrote to memory of 2632 1032 WerFault.exe DllHost.exe PID 3448 wrote to memory of 2804 3448 WerFault.exe StartMenuExperienceHost.exe PID 3448 wrote to memory of 2804 3448 WerFault.exe StartMenuExperienceHost.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup1⤵PID:2128
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2632
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2632 -s 9962⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2876
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3344
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1864
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2952
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2804
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2804 -s 26482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p1⤵PID:2436
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2176
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Drops file in Program Files directory
PID:2108
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe"C:\Users\Admin\AppData\Local\Temp\85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\users\Public\uFeJb.exe"C:\users\Public\uFeJb.exe" C:\Users\Admin\AppData\Local\Temp\85d9b9e22f6b8e1f1d6a56d219d7c4d486b72657834050ce7652792536d0c8e3.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\uFeJb.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\uFeJb.exe" /f4⤵
- Adds Run key to start application
PID:2888
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3172
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 2632 -ip 26321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:1032
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 540 -p 2804 -ip 28041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
567407d941d99abeff20a1b836570d30
SHA1e8866fda01f91c6d4bf8c51cf4cbc7f103e87b0b
SHA256a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510
SHA512514cc28f8da0e8bf054bf0a0963c4253a16df1d5cb8e87dd09294ab97d8e1b5b5fc18c54920a3829d40b0bdda5837567a73b39b4d1839ab919d672ceaf32989b
-
MD5
567407d941d99abeff20a1b836570d30
SHA1e8866fda01f91c6d4bf8c51cf4cbc7f103e87b0b
SHA256a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510
SHA512514cc28f8da0e8bf054bf0a0963c4253a16df1d5cb8e87dd09294ab97d8e1b5b5fc18c54920a3829d40b0bdda5837567a73b39b4d1839ab919d672ceaf32989b