Analysis
-
max time kernel
115s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-04-2022 19:52
Static task
static1
Behavioral task
behavioral1
Sample
SATURN_RANSOM.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SATURN_RANSOM.exe
Resource
win10v2004-20220414-en
General
-
Target
SATURN_RANSOM.exe
-
Size
338KB
-
MD5
bbd4c2d2c72648c8f871b36261be23fd
-
SHA1
77c525e6b8a5760823ad6036e60b3fa244db8e42
-
SHA256
9e87f069de22ceac029a4ac56e6305d2df54227e6b0f0b3ecad52a01fbade021
-
SHA512
38f2ff3b7ff6faa63ef0a3200e0dbb9e48e1d404a065f6919cb6d245699479896a42316f299c33c8cc068922934c64f8aa06c88b000d1676870c1d0c0f18e14a
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\#DECRYPT_MY_FILES#.txt
http://su34pwhpcafeiztt.onion
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\#DECRYPT_MY_FILES#.html
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates VirtualBox registry keys 2 TTPs
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Modifies extensions of user files 33 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\BackupResolve.png.k51L SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\BackupResolve.png => C:\Users\Admin\Pictures\BackupResolve.png.saturn SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\CompleteRestart.tiff SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\PushRemove.tiff SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\StopSet.tiff SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\UnlockCheckpoint.tiff.k51L => C:\Users\Admin\Pictures\UnlockCheckpoint.tiff SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\UnlockCheckpoint.tiff => C:\Users\Admin\Pictures\UnlockCheckpoint.tiff.saturn SATURN_RANSOM.exe File created C:\Users\Admin\Pictures\PushRemove.tiff.k51L SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\PushRemove.tiff.k51L => C:\Users\Admin\Pictures\PushRemove.tiff SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\ResolveExit.tiff => C:\Users\Admin\Pictures\ResolveExit.tiff.saturn SATURN_RANSOM.exe File created C:\Users\Admin\Pictures\StopSet.tiff.k51L SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\WatchSet.tiff => C:\Users\Admin\Pictures\WatchSet.tiff.saturn SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\StopSet.tiff.k51L => C:\Users\Admin\Pictures\StopSet.tiff SATURN_RANSOM.exe File created C:\Users\Admin\Pictures\WatchSet.tiff.k51L SATURN_RANSOM.exe File created C:\Users\Admin\Pictures\CompleteRestart.tiff.k51L SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\ResolveExit.tiff SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\ResolveExit.tiff.k51L SATURN_RANSOM.exe File created C:\Users\Admin\Pictures\UnlockCheckpoint.tiff.k51L SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\UnlockCheckpoint.tiff.k51L SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\WatchSet.tiff.k51L => C:\Users\Admin\Pictures\WatchSet.tiff SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\BackupResolve.png.k51L SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\CompleteRestart.tiff.k51L SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\CompleteRestart.tiff => C:\Users\Admin\Pictures\CompleteRestart.tiff.saturn SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\PushRemove.tiff.k51L SATURN_RANSOM.exe File created C:\Users\Admin\Pictures\ResolveExit.tiff.k51L SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\StopSet.tiff => C:\Users\Admin\Pictures\StopSet.tiff.saturn SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\ResolveExit.tiff.k51L => C:\Users\Admin\Pictures\ResolveExit.tiff SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\StopSet.tiff.k51L SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\WatchSet.tiff SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\CompleteRestart.tiff.k51L => C:\Users\Admin\Pictures\CompleteRestart.tiff SATURN_RANSOM.exe File renamed C:\Users\Admin\Pictures\PushRemove.tiff => C:\Users\Admin\Pictures\PushRemove.tiff.saturn SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\UnlockCheckpoint.tiff SATURN_RANSOM.exe File opened for modification C:\Users\Admin\Pictures\WatchSet.tiff.k51L SATURN_RANSOM.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SATURN_RANSOM.exe -
Deletes itself 1 IoCs
pid Process 1844 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5zy4hsui.lnk SATURN_RANSOM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" SATURN_RANSOM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\#DECRYPT_MY_FILES.BMP" SATURN_RANSOM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1920 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50155aedcb5cd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "358113341" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004863fcdc101a3947b120786fa95ba35b00000000020000000000106600000001000020000000967ed1a4f11fdfadb82cbc8edfad803b89f7d67fa51367048882e5952e65c8f1000000000e8000000002000020000000bb633777df6325afd0f74ca7a24562cde3f0cb73936d828bf31201c5543da96420000000233d25d0b1e33c21e9014bd7ac8021578d1b0f2f6f449f882b1be9695b96c3e94000000056e4582568fc4f6efd445f4670f9339c7b329d2d70ea0a5c295f4ce3b80b0637c08c5543e07eaff55820d25681b62a3743b78a620cf045e1e511b9fabe06602f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{179B9641-C8BF-11EC-8871-E6BBD082ACA2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004863fcdc101a3947b120786fa95ba35b00000000020000000000106600000001000020000000acf6255fb1ddea0dbb4b8155549475e1320f0760e2ce3dcc1d83f9c96e0bd336000000000e8000000002000020000000ff3840a45ebd75237a42c54b5f8469daf0e25670b18b5f60c52fe245477adaff90000000416752bf051c30b2f1557c316bcdc8e4d5bd644947b8117d2f3728835c39bfb004b990df2ab7d3edd3158328dc211fa578345c30c8a6ae3cace737f2f53d537f9d729e84b32149aacc2e0ee0338e1d59d099af8be5a0ed7377a13016713a134067188e7b994c2ce64da3c33a7a78018a3653e7e9e621f631a76f8109d5b1a9b799fa50d43a750086573b5bcfcd3be4b540000000716e531a04ffc0d9e994552ade23029e0a5d5c35f36224e5b7f8558fd5311d63670ea68afcbcc774aa6d46607f93cdfbf5e179a597a0efe4d5bef7a235079123 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1400 PING.EXE -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeBackupPrivilege 992 vssvc.exe Token: SeRestorePrivilege 992 vssvc.exe Token: SeAuditPrivilege 992 vssvc.exe Token: SeIncreaseQuotaPrivilege 1988 WMIC.exe Token: SeSecurityPrivilege 1988 WMIC.exe Token: SeTakeOwnershipPrivilege 1988 WMIC.exe Token: SeLoadDriverPrivilege 1988 WMIC.exe Token: SeSystemProfilePrivilege 1988 WMIC.exe Token: SeSystemtimePrivilege 1988 WMIC.exe Token: SeProfSingleProcessPrivilege 1988 WMIC.exe Token: SeIncBasePriorityPrivilege 1988 WMIC.exe Token: SeCreatePagefilePrivilege 1988 WMIC.exe Token: SeBackupPrivilege 1988 WMIC.exe Token: SeRestorePrivilege 1988 WMIC.exe Token: SeShutdownPrivilege 1988 WMIC.exe Token: SeDebugPrivilege 1988 WMIC.exe Token: SeSystemEnvironmentPrivilege 1988 WMIC.exe Token: SeRemoteShutdownPrivilege 1988 WMIC.exe Token: SeUndockPrivilege 1988 WMIC.exe Token: SeManageVolumePrivilege 1988 WMIC.exe Token: 33 1988 WMIC.exe Token: 34 1988 WMIC.exe Token: 35 1988 WMIC.exe Token: SeIncreaseQuotaPrivilege 1988 WMIC.exe Token: SeSecurityPrivilege 1988 WMIC.exe Token: SeTakeOwnershipPrivilege 1988 WMIC.exe Token: SeLoadDriverPrivilege 1988 WMIC.exe Token: SeSystemProfilePrivilege 1988 WMIC.exe Token: SeSystemtimePrivilege 1988 WMIC.exe Token: SeProfSingleProcessPrivilege 1988 WMIC.exe Token: SeIncBasePriorityPrivilege 1988 WMIC.exe Token: SeCreatePagefilePrivilege 1988 WMIC.exe Token: SeBackupPrivilege 1988 WMIC.exe Token: SeRestorePrivilege 1988 WMIC.exe Token: SeShutdownPrivilege 1988 WMIC.exe Token: SeDebugPrivilege 1988 WMIC.exe Token: SeSystemEnvironmentPrivilege 1988 WMIC.exe Token: SeRemoteShutdownPrivilege 1988 WMIC.exe Token: SeUndockPrivilege 1988 WMIC.exe Token: SeManageVolumePrivilege 1988 WMIC.exe Token: 33 1988 WMIC.exe Token: 34 1988 WMIC.exe Token: 35 1988 WMIC.exe Token: 33 1996 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1996 AUDIODG.EXE Token: 33 1996 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1996 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 692 IEXPLORE.EXE 692 IEXPLORE.EXE 692 IEXPLORE.EXE 692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 632 wrote to memory of 1940 632 SATURN_RANSOM.exe 26 PID 632 wrote to memory of 1940 632 SATURN_RANSOM.exe 26 PID 632 wrote to memory of 1940 632 SATURN_RANSOM.exe 26 PID 632 wrote to memory of 1940 632 SATURN_RANSOM.exe 26 PID 1940 wrote to memory of 1920 1940 cmd.exe 28 PID 1940 wrote to memory of 1920 1940 cmd.exe 28 PID 1940 wrote to memory of 1920 1940 cmd.exe 28 PID 1940 wrote to memory of 1920 1940 cmd.exe 28 PID 1940 wrote to memory of 1988 1940 cmd.exe 30 PID 1940 wrote to memory of 1988 1940 cmd.exe 30 PID 1940 wrote to memory of 1988 1940 cmd.exe 30 PID 1940 wrote to memory of 1988 1940 cmd.exe 30 PID 632 wrote to memory of 1736 632 SATURN_RANSOM.exe 33 PID 632 wrote to memory of 1736 632 SATURN_RANSOM.exe 33 PID 632 wrote to memory of 1736 632 SATURN_RANSOM.exe 33 PID 632 wrote to memory of 1736 632 SATURN_RANSOM.exe 33 PID 632 wrote to memory of 1000 632 SATURN_RANSOM.exe 34 PID 632 wrote to memory of 1000 632 SATURN_RANSOM.exe 34 PID 632 wrote to memory of 1000 632 SATURN_RANSOM.exe 34 PID 632 wrote to memory of 1000 632 SATURN_RANSOM.exe 34 PID 632 wrote to memory of 1884 632 SATURN_RANSOM.exe 35 PID 632 wrote to memory of 1884 632 SATURN_RANSOM.exe 35 PID 632 wrote to memory of 1884 632 SATURN_RANSOM.exe 35 PID 632 wrote to memory of 1884 632 SATURN_RANSOM.exe 35 PID 632 wrote to memory of 1844 632 SATURN_RANSOM.exe 36 PID 632 wrote to memory of 1844 632 SATURN_RANSOM.exe 36 PID 632 wrote to memory of 1844 632 SATURN_RANSOM.exe 36 PID 632 wrote to memory of 1844 632 SATURN_RANSOM.exe 36 PID 1844 wrote to memory of 1400 1844 cmd.exe 38 PID 1844 wrote to memory of 1400 1844 cmd.exe 38 PID 1844 wrote to memory of 1400 1844 cmd.exe 38 PID 1844 wrote to memory of 1400 1844 cmd.exe 38 PID 1884 wrote to memory of 692 1884 iexplore.exe 40 PID 1884 wrote to memory of 692 1884 iexplore.exe 40 PID 1884 wrote to memory of 692 1884 iexplore.exe 40 PID 1884 wrote to memory of 692 1884 iexplore.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\SATURN_RANSOM.exe"C:\Users\Admin\AppData\Local\Temp\SATURN_RANSOM.exe"1⤵
- Modifies extensions of user files
- Checks BIOS information in registry
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /quiet & wmic.exe shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1920
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic.exe shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\#DECRYPT_MY_FILES#.txt2⤵PID:1736
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\#DECRYPT_MY_FILES#.vbs"2⤵PID:1000
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\#DECRYPT_MY_FILES#.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:692
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\SATURN_RANSOM.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1400
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:992
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1952
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5601⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595B
MD5c4745f744850df2fc2177aafb05522b6
SHA12604131523d98865041b1f3fa0dad83cb4bbc744
SHA25617857391d5e09074e7e87abe4d817118a20eb784718db044049da122c3a9024e
SHA512e8a69235d0e49a92b015350eb37137db3c995c83cc309dcd192040dcbb23e616f4218c58d6e9360ab385202b95d6639e4a1d4100c4b9154423178690192a7c4f
-
Filesize
983B
MD581a5c46ac3078e69ee370e929c738602
SHA1404c83c60bf8c5c711be2e99286549c55fed3368
SHA256d6e6ad1b9a348ccab1255ccd894394aec921aa4ecbef55dec17cacdd8c5cd212
SHA5125850a41591a39a84360db47992e360a4f618a28e949e49576cbe10bc624110665d3b1c14f0cfeb9197f567d10cbbe0cedaa9a9a9c281c426b9733f1e9a0614d0
-
Filesize
407B
MD5f3d19c544c10a8337a7d9f7aef079a43
SHA1252612bbdbdbe790853fe560ce5ce8e1df5fcdc5
SHA256b660c9236f4d6d9b62eb04b40599e852f979dd3dbfd1d03e545a287fe8e5d32b
SHA512c5cd69e7134f6d587d0823f6e7f9e5ba6affd75f5398fcea96e299dfb57996234ba87abe4632b2de807a4b79bbafd1b1132ae55b18a815eb8c4112b48942fb1b
-
Filesize
185B
MD523e0e8c821b40253c04d561a6d06e253
SHA15df1808c8485ad1d90f1431adfa2694dbb1ed693
SHA25654905816b33af2b53b2e127e0a7db664d126700b3fdd360894b9d924544f639a
SHA51287a57f1615db68d57381b1a8602c92e57e3a8bf447ed842f410e50efd13a7f7ba44998b00d5e54238f09cad24ffe59c3aa788c1390364c465c761f3da6a688e8