Analysis
-
max time kernel
153s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 05:02
Static task
static1
Behavioral task
behavioral1
Sample
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe
Resource
win10v2004-en-20220112
General
-
Target
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe
-
Size
214KB
-
MD5
7f5669e4d89b5a1636f05b52b7c0f9b7
-
SHA1
12d7b1fb828cea1b1abb568bcc9d0e29e78ecdb6
-
SHA256
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1
-
SHA512
2010a75f1c8634480a42a2c995874459f4ab983fa90ae7fe7d12f0a6d53a34eb68622241f2a43c9218cb8290edb9ca6484991a7811d7e54ead7da5cb8ee3d220
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
lsass.exelsass.exepid process 388 lsass.exe 1428 lsass.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\lsass.exe\" -start" 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Windows\CurrentVersion\Run 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
lsass.exedescription ioc process File opened (read-only) \??\H: lsass.exe File opened (read-only) \??\Y: lsass.exe File opened (read-only) \??\W: lsass.exe File opened (read-only) \??\S: lsass.exe File opened (read-only) \??\Q: lsass.exe File opened (read-only) \??\P: lsass.exe File opened (read-only) \??\J: lsass.exe File opened (read-only) \??\I: lsass.exe File opened (read-only) \??\E: lsass.exe File opened (read-only) \??\B: lsass.exe File opened (read-only) \??\A: lsass.exe File opened (read-only) \??\X: lsass.exe File opened (read-only) \??\U: lsass.exe File opened (read-only) \??\T: lsass.exe File opened (read-only) \??\R: lsass.exe File opened (read-only) \??\N: lsass.exe File opened (read-only) \??\M: lsass.exe File opened (read-only) \??\K: lsass.exe File opened (read-only) \??\Z: lsass.exe File opened (read-only) \??\O: lsass.exe File opened (read-only) \??\G: lsass.exe File opened (read-only) \??\F: lsass.exe File opened (read-only) \??\V: lsass.exe File opened (read-only) \??\L: lsass.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 geoiptool.com -
Drops file in Program Files directory 64 IoCs
Processes:
lsass.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_OEM_Perp-ul-oob.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ul-phn.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\Default.dotx lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\AugLoop\bundle.js lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Grace-ppd.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLENDS\BLENDS.ELM.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\BOOKOSBI.TTF lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_zh_4.4.0.v20140623020002.jar lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-templates_ja.jar lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Glow Edge.eftx.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ppd.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\LASER.WAV.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\AccessBridgePackages.h.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_ru.jar.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jface.nl_zh_4.4.0.v20140623020002.jar lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-common_ja.jar lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-phn.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessDemoR_BypassTrial365-ppd.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ul.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\BREEZE.WAV.5FF-455-18A lsass.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN020.XML.5FF-455-18A lsass.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\vlc.mo.5FF-455-18A lsass.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_KMS_Client-ppd.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_MAK_AE-ul-oob.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\VOLTAGE.WAV.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sql70.xsl lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-awt_zh_CN.jar lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\epl-v10.html lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest1-ul-oob.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsymk.ttf lsass.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT lsass.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ul-phn.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Trial-ppd.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_Subscription-pl.xrm-ms lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.osgi.compatibility.state.nl_ja_4.4.0.v20140623020002.jar.5FF-455-18A lsass.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\locale\org-openide-filesystems_ja.jar.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-white_scale-100.png lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription1-ul-oob.xrm-ms lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Retail-ppd.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Sort\AUTHOR.XSL.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-100.png.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AFTRNOON\AFTRNOON.INF lsass.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\vlc.mo.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-print.jar.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\net.properties lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessRuntime2019R_PrepidBypass-ppd.xrm-ms lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\LICENSE lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-multiview.xml.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\images\cursors\win32_MoveDrop32x32.gif.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Retail-ul-oob.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe.manifest lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\Analysis\ATPVBAEN.XLAM lsass.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_KMS_Client-ul.xrm-ms.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\EUROTOOL.XLAM lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Times New Roman-Arial.xml.5FF-455-18A lsass.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_MAK_AE-ul-oob.xrm-ms lsass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
lsass.exepid process 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe 388 lsass.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe Token: SeDebugPrivilege 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe Token: SeIncreaseQuotaPrivilege 2516 WMIC.exe Token: SeSecurityPrivilege 2516 WMIC.exe Token: SeTakeOwnershipPrivilege 2516 WMIC.exe Token: SeLoadDriverPrivilege 2516 WMIC.exe Token: SeSystemProfilePrivilege 2516 WMIC.exe Token: SeSystemtimePrivilege 2516 WMIC.exe Token: SeProfSingleProcessPrivilege 2516 WMIC.exe Token: SeIncBasePriorityPrivilege 2516 WMIC.exe Token: SeCreatePagefilePrivilege 2516 WMIC.exe Token: SeBackupPrivilege 2516 WMIC.exe Token: SeRestorePrivilege 2516 WMIC.exe Token: SeShutdownPrivilege 2516 WMIC.exe Token: SeDebugPrivilege 2516 WMIC.exe Token: SeSystemEnvironmentPrivilege 2516 WMIC.exe Token: SeRemoteShutdownPrivilege 2516 WMIC.exe Token: SeUndockPrivilege 2516 WMIC.exe Token: SeManageVolumePrivilege 2516 WMIC.exe Token: 33 2516 WMIC.exe Token: 34 2516 WMIC.exe Token: 35 2516 WMIC.exe Token: 36 2516 WMIC.exe Token: SeIncreaseQuotaPrivilege 2688 WMIC.exe Token: SeSecurityPrivilege 2688 WMIC.exe Token: SeTakeOwnershipPrivilege 2688 WMIC.exe Token: SeLoadDriverPrivilege 2688 WMIC.exe Token: SeSystemProfilePrivilege 2688 WMIC.exe Token: SeSystemtimePrivilege 2688 WMIC.exe Token: SeProfSingleProcessPrivilege 2688 WMIC.exe Token: SeIncBasePriorityPrivilege 2688 WMIC.exe Token: SeCreatePagefilePrivilege 2688 WMIC.exe Token: SeBackupPrivilege 2688 WMIC.exe Token: SeRestorePrivilege 2688 WMIC.exe Token: SeShutdownPrivilege 2688 WMIC.exe Token: SeDebugPrivilege 2688 WMIC.exe Token: SeSystemEnvironmentPrivilege 2688 WMIC.exe Token: SeRemoteShutdownPrivilege 2688 WMIC.exe Token: SeUndockPrivilege 2688 WMIC.exe Token: SeManageVolumePrivilege 2688 WMIC.exe Token: 33 2688 WMIC.exe Token: 34 2688 WMIC.exe Token: 35 2688 WMIC.exe Token: 36 2688 WMIC.exe Token: SeIncreaseQuotaPrivilege 2516 WMIC.exe Token: SeIncreaseQuotaPrivilege 2688 WMIC.exe Token: SeSecurityPrivilege 2516 WMIC.exe Token: SeSecurityPrivilege 2688 WMIC.exe Token: SeTakeOwnershipPrivilege 2516 WMIC.exe Token: SeTakeOwnershipPrivilege 2688 WMIC.exe Token: SeLoadDriverPrivilege 2516 WMIC.exe Token: SeLoadDriverPrivilege 2688 WMIC.exe Token: SeSystemProfilePrivilege 2516 WMIC.exe Token: SeSystemProfilePrivilege 2688 WMIC.exe Token: SeSystemtimePrivilege 2516 WMIC.exe Token: SeSystemtimePrivilege 2688 WMIC.exe Token: SeProfSingleProcessPrivilege 2516 WMIC.exe Token: SeProfSingleProcessPrivilege 2688 WMIC.exe Token: SeIncBasePriorityPrivilege 2516 WMIC.exe Token: SeIncBasePriorityPrivilege 2688 WMIC.exe Token: SeCreatePagefilePrivilege 2516 WMIC.exe Token: SeCreatePagefilePrivilege 2688 WMIC.exe Token: SeBackupPrivilege 2516 WMIC.exe Token: SeBackupPrivilege 2688 WMIC.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exelsass.execmd.execmd.exedescription pid process target process PID 3380 wrote to memory of 388 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe lsass.exe PID 3380 wrote to memory of 388 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe lsass.exe PID 3380 wrote to memory of 388 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe lsass.exe PID 3380 wrote to memory of 2188 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe notepad.exe PID 3380 wrote to memory of 2188 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe notepad.exe PID 3380 wrote to memory of 2188 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe notepad.exe PID 3380 wrote to memory of 2188 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe notepad.exe PID 3380 wrote to memory of 2188 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe notepad.exe PID 3380 wrote to memory of 2188 3380 60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe notepad.exe PID 388 wrote to memory of 2916 388 lsass.exe cmd.exe PID 388 wrote to memory of 2916 388 lsass.exe cmd.exe PID 388 wrote to memory of 2916 388 lsass.exe cmd.exe PID 388 wrote to memory of 2864 388 lsass.exe cmd.exe PID 388 wrote to memory of 2864 388 lsass.exe cmd.exe PID 388 wrote to memory of 2864 388 lsass.exe cmd.exe PID 388 wrote to memory of 3040 388 lsass.exe cmd.exe PID 388 wrote to memory of 3040 388 lsass.exe cmd.exe PID 388 wrote to memory of 3040 388 lsass.exe cmd.exe PID 388 wrote to memory of 420 388 lsass.exe cmd.exe PID 388 wrote to memory of 420 388 lsass.exe cmd.exe PID 388 wrote to memory of 420 388 lsass.exe cmd.exe PID 388 wrote to memory of 3372 388 lsass.exe cmd.exe PID 388 wrote to memory of 3372 388 lsass.exe cmd.exe PID 388 wrote to memory of 3372 388 lsass.exe cmd.exe PID 388 wrote to memory of 3468 388 lsass.exe cmd.exe PID 388 wrote to memory of 3468 388 lsass.exe cmd.exe PID 388 wrote to memory of 3468 388 lsass.exe cmd.exe PID 388 wrote to memory of 1428 388 lsass.exe lsass.exe PID 388 wrote to memory of 1428 388 lsass.exe lsass.exe PID 388 wrote to memory of 1428 388 lsass.exe lsass.exe PID 2916 wrote to memory of 2688 2916 cmd.exe WMIC.exe PID 2916 wrote to memory of 2688 2916 cmd.exe WMIC.exe PID 2916 wrote to memory of 2688 2916 cmd.exe WMIC.exe PID 3468 wrote to memory of 2516 3468 cmd.exe WMIC.exe PID 3468 wrote to memory of 2516 3468 cmd.exe WMIC.exe PID 3468 wrote to memory of 2516 3468 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe"C:\Users\Admin\AppData\Local\Temp\60e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CBMD5
0af9873e7d694b6af100acc5d66d625f
SHA14e382572f28043136ff10d6e80f09ea2153a8ec1
SHA256983ea452db6d000be67b0e2d5ddf8beb2d42454e9108adcdfec5fdb04afcdc60
SHA512b8ece43a58a5004a74fc888ab9f2140f10ffbefed2bdc3e78a586aa05e396486be67f6035e1c21eff48717651647fcf107937c2365b023280faeaff719d905e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEEMD5
5bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B1230D967FD647CD5194F3FFA6C7E7E4MD5
0f96cf32580efc867ff48db74bc92e4b
SHA12d16ce1151807b1cc5445db9bd511d0a2c90cf01
SHA2567176b87dd59195a7e0fb8624010b143d1ca991161748e2cd38a88a4eec91a8da
SHA5129d9e74180ef53053ebcfe25dd50659b002a4422c9253b82c78804b97329b57ea1ee19edf9eadec09d45f1b034270a15a7da5e5943406415dc259ca58fa459dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
aa4b7669eef55fc7705d31672b88980d
SHA1131a6930acf0f1e90ffe67faa4e68055cc525118
SHA256f964c248ccfb020296430658f3cdf78b18f7904611c5a4f67ce9b3bb3c7464f8
SHA512414a578a7141ac0c0b28d894ea942baee758c362aceb81724baeb59abf4d0bfc1486c7ef9206a08ffad243cb543abfe2a70947223f7a58831070734056c36cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CBMD5
d183f3b450dd13f37dac1f584503f117
SHA16bd37799b1734c6f5903da34ff7336f78c15b58c
SHA2562a7c9e63db503ffb6f2885fa65e4a91d83d87013602dc0dbc9cab5e97c687198
SHA51240831383ff02265d7591cda58a7d2b0529adebd5b48c148189ad0bedb18ea699d7bd04e68b7cf3f4eaaa8c5e79ce1efdd124be5b71e6a8cfd706498165555d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEEMD5
7020f9485feafdcded3bdc2ce87bbb26
SHA17b9a37691f219dcc12d4a7afc92be26646639c38
SHA25685486a6872426a643b837ae7c3f05a095df6b071a05c721b6bc552df50762deb
SHA512b6c6ebe5908f1835410eac429d392758691922f0a970da3df41f82847e1f3c068b2d561719b7cd91effb0ffa13013dbbb594502acb7bc9b027fd0423809d3488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B1230D967FD647CD5194F3FFA6C7E7E4MD5
b8739560f95a20818661cd24e0429727
SHA19a187b63eb64fb512bf3734a9c7a2a2609c185c0
SHA256d352a406365f5a70eb3a78fff053488c93b600fb233e595dfea2e7dc7ed908ad
SHA5127b3d05c3c2bff212c81982adf61073d4e7ad4ce2e2cecf22b1fbbf77279e780c7b987b48fe82db2887001faba66b0f610fada27c7e721bcb95afd629b5f08fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
fd5475ddc37212dea9f87550b54eca15
SHA1a048fa1d83d05f3d52c741d7a7bac551bd15b1eb
SHA25629734d1ba3c5df47d9ddb7a0808ff047ceb085cab437dd10b1dcdcbd9a8f8fb6
SHA512d48397aeb32bea9521c2d8fa28e6ff7d0511f32d9127f0023d06bcff699ca7b5535edee7e38b6d774f6f658872d09c9d11af5c00be0dfe4f10e22d9622867652
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GS28O9WE\1KSVIXYN.htmMD5
8615e70875c2cc0b9db16027b9adf11d
SHA14ed62cf405311c0ff562a3c59334a15ddc4f1bf9
SHA256da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d
SHA512cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VMAZW8LB\1W02D93S.htmMD5
b1cd7c031debba3a5c77b39b6791c1a7
SHA1e5d91e14e9c685b06f00e550d9e189deb2075f76
SHA25657ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa
SHA512d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72
-
C:\Users\Admin\AppData\Local\Temp\~temp001.batMD5
ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exeMD5
7f5669e4d89b5a1636f05b52b7c0f9b7
SHA112d7b1fb828cea1b1abb568bcc9d0e29e78ecdb6
SHA25660e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1
SHA5122010a75f1c8634480a42a2c995874459f4ab983fa90ae7fe7d12f0a6d53a34eb68622241f2a43c9218cb8290edb9ca6484991a7811d7e54ead7da5cb8ee3d220
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exeMD5
7f5669e4d89b5a1636f05b52b7c0f9b7
SHA112d7b1fb828cea1b1abb568bcc9d0e29e78ecdb6
SHA25660e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1
SHA5122010a75f1c8634480a42a2c995874459f4ab983fa90ae7fe7d12f0a6d53a34eb68622241f2a43c9218cb8290edb9ca6484991a7811d7e54ead7da5cb8ee3d220
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exeMD5
7f5669e4d89b5a1636f05b52b7c0f9b7
SHA112d7b1fb828cea1b1abb568bcc9d0e29e78ecdb6
SHA25660e2ff67f5e92eebcdca4b22343d4cd663e9c63e6259d9f4563e68da38b330e1
SHA5122010a75f1c8634480a42a2c995874459f4ab983fa90ae7fe7d12f0a6d53a34eb68622241f2a43c9218cb8290edb9ca6484991a7811d7e54ead7da5cb8ee3d220
-
memory/2188-134-0x0000000003270000-0x0000000003271000-memory.dmpFilesize
4KB