Analysis
-
max time kernel
166s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 07:22
Static task
static1
Behavioral task
behavioral1
Sample
529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe
Resource
win10v2004-en-20220112
General
-
Target
529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe
-
Size
171KB
-
MD5
bb0929ec43b8eea61ab777ecd9f44541
-
SHA1
f1fd81590a93b8895884f2bafcd8d48de1627fdb
-
SHA256
529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967
-
SHA512
09dadd375f5faebeba2761dc7cfc6cc7cdb52ecce3798044a88c5bc165d2e6b3c3810a7ff62641363e613a5c9f512f0be5d0bbdac83f68838feaac26b78680a0
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Drops desktop.ini file(s) 59 IoCs
Processes:
529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exedescription ioc process File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Contacts\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Pictures\Sample Pictures\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Favorites\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Favorites\Links for United States\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Searches\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Desktop\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Pictures\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Music\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\System Tools\Desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Administrative Tools\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Videos\Sample Videos\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Maintenance\Desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Videos\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Startup\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Videos\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Downloads\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Links\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Start Menu\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Pictures\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Start Menu\Programs\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Desktop\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Desktop\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Music\Sample Music\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Saved Games\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Favorites\Links\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Pictures\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Documents\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\Recent\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\Admin\SendTo\Desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Music\desktop.ini 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exepid process 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exedescription pid process Token: SeDebugPrivilege 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe Token: SeBackupPrivilege 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1616 wrote to memory of 1232 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe taskhost.exe PID 1616 wrote to memory of 1332 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe Dwm.exe PID 1616 wrote to memory of 996 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 996 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 996 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 996 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1356 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1356 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1356 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1356 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1760 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1760 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1760 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1760 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1992 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1992 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1992 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 1992 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1992 wrote to memory of 1580 1992 net.exe net1.exe PID 1992 wrote to memory of 1580 1992 net.exe net1.exe PID 1992 wrote to memory of 1580 1992 net.exe net1.exe PID 1992 wrote to memory of 1580 1992 net.exe net1.exe PID 1356 wrote to memory of 1764 1356 net.exe net1.exe PID 1356 wrote to memory of 1764 1356 net.exe net1.exe PID 1356 wrote to memory of 1764 1356 net.exe net1.exe PID 1356 wrote to memory of 1764 1356 net.exe net1.exe PID 1760 wrote to memory of 2044 1760 net.exe net1.exe PID 1760 wrote to memory of 2044 1760 net.exe net1.exe PID 1760 wrote to memory of 2044 1760 net.exe net1.exe PID 1760 wrote to memory of 2044 1760 net.exe net1.exe PID 996 wrote to memory of 2000 996 net.exe net1.exe PID 996 wrote to memory of 2000 996 net.exe net1.exe PID 996 wrote to memory of 2000 996 net.exe net1.exe PID 996 wrote to memory of 2000 996 net.exe net1.exe PID 1616 wrote to memory of 9324 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 9324 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 9324 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 9324 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 9324 wrote to memory of 9348 9324 net.exe net1.exe PID 9324 wrote to memory of 9348 9324 net.exe net1.exe PID 9324 wrote to memory of 9348 9324 net.exe net1.exe PID 9324 wrote to memory of 9348 9324 net.exe net1.exe PID 1616 wrote to memory of 9360 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 9360 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 9360 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 9360 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 9360 wrote to memory of 9384 9360 net.exe net1.exe PID 9360 wrote to memory of 9384 9360 net.exe net1.exe PID 9360 wrote to memory of 9384 9360 net.exe net1.exe PID 9360 wrote to memory of 9384 9360 net.exe net1.exe PID 1616 wrote to memory of 18416 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 18416 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 18416 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 18416 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 18416 wrote to memory of 9360 18416 net.exe net1.exe PID 18416 wrote to memory of 9360 18416 net.exe net1.exe PID 18416 wrote to memory of 9360 18416 net.exe net1.exe PID 18416 wrote to memory of 9360 18416 net.exe net1.exe PID 1616 wrote to memory of 9380 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 9380 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 9380 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 1616 wrote to memory of 9380 1616 529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe net.exe PID 9380 wrote to memory of 2028 9380 net.exe net1.exe PID 9380 wrote to memory of 2028 9380 net.exe net1.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe"C:\Users\Admin\AppData\Local\Temp\529cefc842349f283599931e53f5b97bd6083e986e8a8e16f8aca370d5390967.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵