Analysis
-
max time kernel
171s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
24-03-2022 16:03
Static task
static1
Behavioral task
behavioral1
Sample
950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe
Resource
win10v2004-en-20220113
General
-
Target
950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe
-
Size
30KB
-
MD5
ed0413e7e8a4280fe74f5afb87054b52
-
SHA1
92f8eca9aaad091ed525d52565932843097cc36e
-
SHA256
950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e
-
SHA512
55ccdcb90e556c83afdfcd1fb2106518d35c719ff199f8430377293a297223e14cccdc29add9b3c9b08221f9268f55d56f0ca17ab21cb898a9a1224daea6c8c4
Malware Config
Extracted
Protocol: smtp- Host:
mail.gmx.net - Port:
587 - Username:
[email protected] - Password:
cuF.7P\Bv#C>`pu)
Signatures
-
T1Happy
T1Happy ransomware is a cryptovirus that behaves different than its counterparts.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables RegEdit via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Users\\Admin\\AppData\\Local\\Temp\\950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe" 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Users\\Admin\\AppData\\Local\\Temp\\950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe" 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe -
Drops desktop.ini file(s) 15 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\Desktop\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 api.ipify.org 18 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\DataMatrix.pmp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\trash.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\turnOffNotificationInTray.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\index.html 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\AddressBook2x.png 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\apple-touch-icon-72x72-precomposed.png 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ccme_asym.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Welcome.pdf 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-down.svg 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\eula.ini 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\weblink.api 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\Flash.mpp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\JP2KLib.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Measure.aapp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\MoreTools.aapp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\A12_Spinner_int_2x.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Microsoft.VCLibs.x86.14.00.appx 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\pe.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\server_ok.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\plugins.js 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\nppdf32.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\version.js 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\email_initiator.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\rss.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\core_icons_retina.png 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\cef.pak 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UIThemes\DarkTheme.acrotheme 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\submission_history.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\chrome_elf.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\AdobePDF417.pmp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\prcr.x3d 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\stop_collection_data.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\version.js 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\core_icons.png 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Checkers.api 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Spelling.api 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\icudt.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\DigSig.api 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\PDDom.api 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\email_all.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\base_uris.js 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ACE.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Edit_R_Full.aapp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\init.js 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\d3dcompiler_47.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\widevinecdmadapter.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Search.api 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_joined.gif 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Edit_R_RHP.aapp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Home.aapp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main-cef.css 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\acrobat_parcel_generic_32.svg 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\d3dcompiler_43.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\MCIMPP.mpp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\sqlite.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Redact_R_RHP.aapp 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\nppdf32.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\SaveAsRTF.api 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroSup64.dll 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3772 wrote to memory of 1544 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 87 PID 3772 wrote to memory of 1544 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 87 PID 3772 wrote to memory of 1544 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 87 PID 3772 wrote to memory of 4108 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 88 PID 3772 wrote to memory of 4108 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 88 PID 3772 wrote to memory of 4108 3772 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe 88 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe"C:\Users\Admin\AppData\Local\Temp\950be5b5501ee84b1641c3a9a780242a57cdd412892c781eac8781498bf11f3e.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3772 -
C:\Windows\SysWOW64\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete2⤵PID:1544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c takeown /f C:\Windows\"."2⤵PID:4108
-