Analysis
-
max time kernel
153s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 00:23
Static task
static1
Behavioral task
behavioral1
Sample
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe
Resource
win10v2004-en-20220112
General
-
Target
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe
-
Size
2.6MB
-
MD5
811527176b1b2357e96f357e141c7f29
-
SHA1
8d00d383b6c4825edcf46a620d7b7a3e5f53e09d
-
SHA256
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9
-
SHA512
597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
services.exeservices.exepid process 4064 services.exe 2812 services.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Windows\CurrentVersion\Run 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\services.exe\" -start" 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
services.exedescription ioc process File opened (read-only) \??\Q: services.exe File opened (read-only) \??\P: services.exe File opened (read-only) \??\O: services.exe File opened (read-only) \??\L: services.exe File opened (read-only) \??\K: services.exe File opened (read-only) \??\J: services.exe File opened (read-only) \??\I: services.exe File opened (read-only) \??\R: services.exe File opened (read-only) \??\G: services.exe File opened (read-only) \??\H: services.exe File opened (read-only) \??\T: services.exe File opened (read-only) \??\N: services.exe File opened (read-only) \??\B: services.exe File opened (read-only) \??\Z: services.exe File opened (read-only) \??\X: services.exe File opened (read-only) \??\W: services.exe File opened (read-only) \??\U: services.exe File opened (read-only) \??\S: services.exe File opened (read-only) \??\F: services.exe File opened (read-only) \??\E: services.exe File opened (read-only) \??\A: services.exe File opened (read-only) \??\Y: services.exe File opened (read-only) \??\M: services.exe File opened (read-only) \??\V: services.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 geoiptool.com -
Drops file in Program Files directory 64 IoCs
Processes:
services.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.ui.ja_5.5.0.165303.jar.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ppd.xrm-ms.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ar\msipc.dll.mui.35D-15C-65F services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-favorites_zh_CN.jar services.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Century Schoolbook.xml.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Grace-ul-oob.xrm-ms.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_KMS_Client-ul-oob.xrm-ms services.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\hive.xsl services.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-100.png.35D-15C-65F services.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\vlc.mo services.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x services.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\WideTile.scale-125.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeTile.scale-200_contrast-black.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-96_altform-unplated.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-48.png services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui_5.5.0.165303.jar.35D-15C-65F services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-150_contrast-white.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\Preview.scale-200_layoutdir-RTL.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-96_altform-unplated_contrast-white_devicefamily-colorfulunplated.png services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf_1.1.0.v20140408-1354.jar services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-explorer.jar.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSO0127.ACL services.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-white\MedTile.scale-125.png services.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-black\MedTile.scale-125.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_PigNose.png services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\ct.sym.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ul-oob.xrm-ms.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial5-ul-oob.xrm-ms.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_KMS_Client-ul.xrm-ms.35D-15C-65F services.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\resources.pri services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\Light\Paint3D.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.scale-100.png services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.attach_5.5.0.165303.jar.35D-15C-65F services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-nodes.jar services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-actions_ja.jar services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_KMS_Client-ul.xrm-ms.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Retail-ul-oob.xrm-ms.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\WATER\WATER.INF.35D-15C-65F services.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_100_eeeeee_1x100.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.targetsize-256_altform-unplated_contrast-white.png services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.nl_ja_4.4.0.v20140623020002.jar.35D-15C-65F services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerEvaluators.exsd.35D-15C-65F services.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp-pl.xrm-ms.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-oob.xrm-ms.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PPT_WHATSNEW.XML.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\1033\MCABOUT.HTM.35D-15C-65F services.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\filename.luac services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\content-types.properties services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaSansDemiBold.ttf services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.zh_CN_5.5.0.165303.jar services.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL103.XML services.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT services.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SPRING\SPRING.INF.35D-15C-65F services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\9.png services.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\Attribution\weather_trends.png services.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.HTM.35D-15C-65F services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_KMS_Client-ppd.xrm-ms services.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_KMS_Client-ppd.xrm-ms services.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\MS.JPG services.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RMNSQUE\PREVIEW.GIF.35D-15C-65F services.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.felix.gogo.command_0.10.0.v201209301215.jar services.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\security\java.security.35D-15C-65F services.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe Token: SeDebugPrivilege 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe Token: SeIncreaseQuotaPrivilege 560 WMIC.exe Token: SeSecurityPrivilege 560 WMIC.exe Token: SeTakeOwnershipPrivilege 560 WMIC.exe Token: SeLoadDriverPrivilege 560 WMIC.exe Token: SeSystemProfilePrivilege 560 WMIC.exe Token: SeSystemtimePrivilege 560 WMIC.exe Token: SeProfSingleProcessPrivilege 560 WMIC.exe Token: SeIncBasePriorityPrivilege 560 WMIC.exe Token: SeCreatePagefilePrivilege 560 WMIC.exe Token: SeBackupPrivilege 560 WMIC.exe Token: SeRestorePrivilege 560 WMIC.exe Token: SeShutdownPrivilege 560 WMIC.exe Token: SeDebugPrivilege 560 WMIC.exe Token: SeSystemEnvironmentPrivilege 560 WMIC.exe Token: SeRemoteShutdownPrivilege 560 WMIC.exe Token: SeUndockPrivilege 560 WMIC.exe Token: SeManageVolumePrivilege 560 WMIC.exe Token: 33 560 WMIC.exe Token: 34 560 WMIC.exe Token: 35 560 WMIC.exe Token: 36 560 WMIC.exe Token: SeIncreaseQuotaPrivilege 3364 WMIC.exe Token: SeSecurityPrivilege 3364 WMIC.exe Token: SeTakeOwnershipPrivilege 3364 WMIC.exe Token: SeLoadDriverPrivilege 3364 WMIC.exe Token: SeSystemProfilePrivilege 3364 WMIC.exe Token: SeSystemtimePrivilege 3364 WMIC.exe Token: SeProfSingleProcessPrivilege 3364 WMIC.exe Token: SeIncBasePriorityPrivilege 3364 WMIC.exe Token: SeCreatePagefilePrivilege 3364 WMIC.exe Token: SeBackupPrivilege 3364 WMIC.exe Token: SeRestorePrivilege 3364 WMIC.exe Token: SeShutdownPrivilege 3364 WMIC.exe Token: SeDebugPrivilege 3364 WMIC.exe Token: SeSystemEnvironmentPrivilege 3364 WMIC.exe Token: SeRemoteShutdownPrivilege 3364 WMIC.exe Token: SeUndockPrivilege 3364 WMIC.exe Token: SeManageVolumePrivilege 3364 WMIC.exe Token: 33 3364 WMIC.exe Token: 34 3364 WMIC.exe Token: 35 3364 WMIC.exe Token: 36 3364 WMIC.exe Token: SeIncreaseQuotaPrivilege 3364 WMIC.exe Token: SeIncreaseQuotaPrivilege 560 WMIC.exe Token: SeSecurityPrivilege 3364 WMIC.exe Token: SeSecurityPrivilege 560 WMIC.exe Token: SeTakeOwnershipPrivilege 3364 WMIC.exe Token: SeTakeOwnershipPrivilege 560 WMIC.exe Token: SeLoadDriverPrivilege 3364 WMIC.exe Token: SeLoadDriverPrivilege 560 WMIC.exe Token: SeSystemProfilePrivilege 3364 WMIC.exe Token: SeSystemProfilePrivilege 560 WMIC.exe Token: SeSystemtimePrivilege 3364 WMIC.exe Token: SeSystemtimePrivilege 560 WMIC.exe Token: SeProfSingleProcessPrivilege 3364 WMIC.exe Token: SeProfSingleProcessPrivilege 560 WMIC.exe Token: SeIncBasePriorityPrivilege 560 WMIC.exe Token: SeCreatePagefilePrivilege 560 WMIC.exe Token: SeIncBasePriorityPrivilege 3364 WMIC.exe Token: SeBackupPrivilege 560 WMIC.exe Token: SeCreatePagefilePrivilege 3364 WMIC.exe Token: SeRestorePrivilege 560 WMIC.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exeservices.execmd.execmd.exedescription pid process target process PID 212 wrote to memory of 4064 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe services.exe PID 212 wrote to memory of 4064 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe services.exe PID 212 wrote to memory of 4064 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe services.exe PID 212 wrote to memory of 1616 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe notepad.exe PID 212 wrote to memory of 1616 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe notepad.exe PID 212 wrote to memory of 1616 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe notepad.exe PID 212 wrote to memory of 1616 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe notepad.exe PID 212 wrote to memory of 1616 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe notepad.exe PID 212 wrote to memory of 1616 212 6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe notepad.exe PID 4064 wrote to memory of 3912 4064 services.exe cmd.exe PID 4064 wrote to memory of 3912 4064 services.exe cmd.exe PID 4064 wrote to memory of 3912 4064 services.exe cmd.exe PID 4064 wrote to memory of 3980 4064 services.exe cmd.exe PID 4064 wrote to memory of 3980 4064 services.exe cmd.exe PID 4064 wrote to memory of 3980 4064 services.exe cmd.exe PID 4064 wrote to memory of 1856 4064 services.exe cmd.exe PID 4064 wrote to memory of 1856 4064 services.exe cmd.exe PID 4064 wrote to memory of 1856 4064 services.exe cmd.exe PID 4064 wrote to memory of 1928 4064 services.exe cmd.exe PID 4064 wrote to memory of 1928 4064 services.exe cmd.exe PID 4064 wrote to memory of 1928 4064 services.exe cmd.exe PID 4064 wrote to memory of 2828 4064 services.exe cmd.exe PID 4064 wrote to memory of 2828 4064 services.exe cmd.exe PID 4064 wrote to memory of 2828 4064 services.exe cmd.exe PID 4064 wrote to memory of 3548 4064 services.exe cmd.exe PID 4064 wrote to memory of 3548 4064 services.exe cmd.exe PID 4064 wrote to memory of 3548 4064 services.exe cmd.exe PID 4064 wrote to memory of 2812 4064 services.exe services.exe PID 4064 wrote to memory of 2812 4064 services.exe services.exe PID 4064 wrote to memory of 2812 4064 services.exe services.exe PID 3912 wrote to memory of 560 3912 cmd.exe WMIC.exe PID 3912 wrote to memory of 560 3912 cmd.exe WMIC.exe PID 3912 wrote to memory of 560 3912 cmd.exe WMIC.exe PID 3548 wrote to memory of 3364 3548 cmd.exe WMIC.exe PID 3548 wrote to memory of 3364 3548 cmd.exe WMIC.exe PID 3548 wrote to memory of 3364 3548 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe"C:\Users\Admin\AppData\Local\Temp\6772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CBMD5
0af9873e7d694b6af100acc5d66d625f
SHA14e382572f28043136ff10d6e80f09ea2153a8ec1
SHA256983ea452db6d000be67b0e2d5ddf8beb2d42454e9108adcdfec5fdb04afcdc60
SHA512b8ece43a58a5004a74fc888ab9f2140f10ffbefed2bdc3e78a586aa05e396486be67f6035e1c21eff48717651647fcf107937c2365b023280faeaff719d905e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEEMD5
5bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B1230D967FD647CD5194F3FFA6C7E7E4MD5
0f96cf32580efc867ff48db74bc92e4b
SHA12d16ce1151807b1cc5445db9bd511d0a2c90cf01
SHA2567176b87dd59195a7e0fb8624010b143d1ca991161748e2cd38a88a4eec91a8da
SHA5129d9e74180ef53053ebcfe25dd50659b002a4422c9253b82c78804b97329b57ea1ee19edf9eadec09d45f1b034270a15a7da5e5943406415dc259ca58fa459dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
aa4b7669eef55fc7705d31672b88980d
SHA1131a6930acf0f1e90ffe67faa4e68055cc525118
SHA256f964c248ccfb020296430658f3cdf78b18f7904611c5a4f67ce9b3bb3c7464f8
SHA512414a578a7141ac0c0b28d894ea942baee758c362aceb81724baeb59abf4d0bfc1486c7ef9206a08ffad243cb543abfe2a70947223f7a58831070734056c36cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CBMD5
1aa237d03fe099482b418a6d25e662da
SHA189ac021cebc0484e7d539ae8dc42637db253ecba
SHA25668ee606015b10dbb3af1a45659b1b8696314b1ec53102f6df14062735132782c
SHA512360a129968d88bf1aec8e4c07141d98654543ab31761d238865aa9bbd6df2de978e3939248c403dda3e23a0c2ccac295559fdd7c0799b86b574a9a6519104b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEEMD5
4f4296da3d648b2d530e1594b7052a05
SHA1a6ef353ec0da38da3bb40a854faa0ade799b460e
SHA256ef9567abb8c7e36bcbafdb4bce62a08971f76b32bdb8f63edc392fa63607b34d
SHA5122a130bec655161cd096d89351309b0c1ad4a0c9a573d8dda1a57b116014b63e3fa3e856f837038633883dac8e971205b63f438e1a0c597f726f4bd8099014de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B1230D967FD647CD5194F3FFA6C7E7E4MD5
0a55d2cbc265501553259f29ecc4f630
SHA180eb5873ebbefd641d8bb6183c3f0394a1adde99
SHA2562fa02bc89bc7577a8397ac8bdac8c95477ff48a3abf9377a98de24e918c5fa7c
SHA5125ac9cc223e5e41860e43ba8b71dbdb16e4214da623081b23693af2e03653cfd1c09bea99db18b437d233d4455ed5aa227010bc680c88594d4553a8fbeb79ed63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
a663a42ebcfb450889f57520f7e22e64
SHA1dbfcce80cf0dcc5c7361ed06105de2a9a3ad6562
SHA256e30963fcdc6e734916c1f13906ce70e4113765d8dccbd5c06cabb9049894ac5f
SHA5125caf3192e52aa58f5c1d583bc8b9884514a6ac86ad06553ecd157aa45e5e212dd9fa2a4f034204dc4afc5b06640d9e91d8f153fa08e7c03c5cdc28de4580724e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GS28O9WE\6OIPT6U7.htmMD5
8615e70875c2cc0b9db16027b9adf11d
SHA14ed62cf405311c0ff562a3c59334a15ddc4f1bf9
SHA256da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d
SHA512cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VMAZW8LB\PMGRCJIO.htmMD5
b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
C:\Users\Admin\AppData\Local\Temp\~temp001.batMD5
ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exeMD5
811527176b1b2357e96f357e141c7f29
SHA18d00d383b6c4825edcf46a620d7b7a3e5f53e09d
SHA2566772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9
SHA512597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exeMD5
811527176b1b2357e96f357e141c7f29
SHA18d00d383b6c4825edcf46a620d7b7a3e5f53e09d
SHA2566772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9
SHA512597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exeMD5
811527176b1b2357e96f357e141c7f29
SHA18d00d383b6c4825edcf46a620d7b7a3e5f53e09d
SHA2566772641fa3c9e918f0c887ee1bd67d3ce65c4cd28888d96f927c5d1b72851bf9
SHA512597aaab2e64ad2917aa308d8c65811024de20eee1c3c19f624c77a62174d08fd26daf95c6e50b3e74c338fecceab466b2d84517b759f2f24cd26e4d3331bea92
-
memory/1616-142-0x0000000000DD0000-0x0000000000DD1000-memory.dmpFilesize
4KB