Analysis
-
max time kernel
136s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
06/05/2022, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
texi64.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
texi64.dll
Resource
win10v2004-20220414-en
General
-
Target
texi64.dll
-
Size
280KB
-
MD5
f2b8daf9be5866844bb5f1a860d4433f
-
SHA1
6097602f35245926bdcbffcd86ef6f67b2af7bd8
-
SHA256
e4756dc21114c9de523af307992382dfd0fc0cf7ccf19d5351998c498561ca20
-
SHA512
b26d90b64bea4b7177d83498efb58d42902e4cc76e9386fd6be6040a5b17d28ed1093b769a4728cfa1e0fdb756c8238a1b8914379b161bf8d6b1f51324a4b73a
Malware Config
Signatures
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\MeasureInitialize.raw => \??\c:\Users\Admin\Pictures\MeasureInitialize.raw.quantum rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\OpenSync.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\OpenSync.tiff => \??\c:\Users\Admin\Pictures\OpenSync.tiff.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\PopSelect.crw => \??\c:\Users\Admin\Pictures\PopSelect.crw.quantum rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\SwitchRead.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\SwitchRead.tiff => \??\c:\Users\Admin\Pictures\SwitchRead.tiff.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\InvokeOpen.raw => \??\c:\Users\Admin\Pictures\InvokeOpen.raw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\MeasureCompress.tif => \??\c:\Users\Admin\Pictures\MeasureCompress.tif.quantum rundll32.exe -
Deletes itself 1 IoCs
pid Process 804 cmd.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification \??\c:\Users\Public\Libraries\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Recorded TV\Sample Media\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Music\Sample Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Pictures\Sample Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Recorded TV\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Videos\Sample Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links for United States\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19CC0901-CD5F-11EC-A484-C2F2D41BD72F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000962422cf799f2f46a7e75b376cef3c3c0000000002000000000010660000000100002000000041f97a4687153484ac7f936639c664e494c6eae66dce46f471a37f30ddc62128000000000e8000000002000020000000caeaf65a77f1b4c3a96b6bbe49f35362621876f4b2f15700a791a48237802d3820000000e67c1bbf4d80950f9bcb49584c226f008633e103467cfbc33237875d8a73857d400000005d4277bbcf9ea87d3a23abaa07aaab62f10098018280a9ee6ef7c94f9eb549d54b389fc9cb8462c23e428106f6484184e369ee23bd0ee884ae58ddd7cc1fb1e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7755321-CD5E-11EC-A484-C2F2D41BD72F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\.quantum\shell\Open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\.quantum\shell\Open\command\ = "explorer.exe README_TO_DECRYPT.html" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\.quantum\shell\Open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\.quantum rundll32.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000_CLASSES\.quantum\shell rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1668 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1224 rundll32.exe 1224 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1224 rundll32.exe Token: SeDebugPrivilege 1224 rundll32.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1700 iexplore.exe 1180 iexplore.exe 980 iexplore.exe 1584 iexplore.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 308 IEXPLORE.EXE 308 IEXPLORE.EXE 308 IEXPLORE.EXE 308 IEXPLORE.EXE 1180 iexplore.exe 1180 iexplore.exe 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 980 iexplore.exe 980 iexplore.exe 548 IEXPLORE.EXE 548 IEXPLORE.EXE 1584 iexplore.exe 1584 iexplore.exe 1596 IEXPLORE.EXE 1596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1224 wrote to memory of 804 1224 rundll32.exe 27 PID 1224 wrote to memory of 804 1224 rundll32.exe 27 PID 1224 wrote to memory of 804 1224 rundll32.exe 27 PID 804 wrote to memory of 980 804 cmd.exe 29 PID 804 wrote to memory of 980 804 cmd.exe 29 PID 804 wrote to memory of 980 804 cmd.exe 29 PID 1700 wrote to memory of 308 1700 iexplore.exe 32 PID 1700 wrote to memory of 308 1700 iexplore.exe 32 PID 1700 wrote to memory of 308 1700 iexplore.exe 32 PID 1700 wrote to memory of 308 1700 iexplore.exe 32 PID 1448 wrote to memory of 1180 1448 explorer.exe 35 PID 1448 wrote to memory of 1180 1448 explorer.exe 35 PID 1448 wrote to memory of 1180 1448 explorer.exe 35 PID 1180 wrote to memory of 1752 1180 iexplore.exe 36 PID 1180 wrote to memory of 1752 1180 iexplore.exe 36 PID 1180 wrote to memory of 1752 1180 iexplore.exe 36 PID 1180 wrote to memory of 1752 1180 iexplore.exe 36 PID 1536 wrote to memory of 980 1536 explorer.exe 39 PID 1536 wrote to memory of 980 1536 explorer.exe 39 PID 1536 wrote to memory of 980 1536 explorer.exe 39 PID 980 wrote to memory of 548 980 iexplore.exe 40 PID 980 wrote to memory of 548 980 iexplore.exe 40 PID 980 wrote to memory of 548 980 iexplore.exe 40 PID 980 wrote to memory of 548 980 iexplore.exe 40 PID 1080 wrote to memory of 1668 1080 rundll32.exe 42 PID 1080 wrote to memory of 1668 1080 rundll32.exe 42 PID 1080 wrote to memory of 1668 1080 rundll32.exe 42 PID 1852 wrote to memory of 1584 1852 explorer.exe 45 PID 1852 wrote to memory of 1584 1852 explorer.exe 45 PID 1852 wrote to memory of 1584 1852 explorer.exe 45 PID 1584 wrote to memory of 1596 1584 iexplore.exe 46 PID 1584 wrote to memory of 1596 1584 iexplore.exe 46 PID 1584 wrote to memory of 1596 1584 iexplore.exe 46 PID 1584 wrote to memory of 1596 1584 iexplore.exe 46 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 980 attrib.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\texi64.dll,#11⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\006C7E83.bat" """2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\attrib.exeattrib -s -r -h ""3⤵
- Views/modifies file attributes
PID:980
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:308
-
-
C:\Windows\explorer.exe"explorer.exe" README_TO_DECRYPT.html1⤵PID:1308
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1180 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1752
-
-
-
C:\Windows\explorer.exe"explorer.exe" README_TO_DECRYPT.html1⤵PID:1628
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:980 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:548
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\ResetConnect.dotm.quantum1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ResetConnect.dotm.quantum2⤵
- Opens file in notepad (likely ransom note)
PID:1668
-
-
C:\Windows\explorer.exe"explorer.exe" README_TO_DECRYPT.html1⤵PID:780
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1584 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1596
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{04BA1D41-CD5F-11EC-A484-C2F2D41BD72F}.dat
Filesize5KB
MD584e188bbf5ee5c39c133d3d018dbb52b
SHA1a647f25c221dd86a579f20588c3bedcf21074cca
SHA2565ddf5ecbf72e7e7d9b740ea39379dc9d1b42f54e5e21d90cd16f5b84dba42b90
SHA5121ad9692c4d29a090e50bc672a70b4003371014dad2ede378feaf34e1c699d9dd3ad18f51f3f7d14dbef0edd621a84a6bd2e3b1237a39ec484e199e1a7403388c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{07E10F61-CD5F-11EC-A484-C2F2D41BD72F}.dat
Filesize5KB
MD5ac7d5b022df9bcc0fe43737bc119a84b
SHA18c85c86e0c67e2e5bd239750407a820e523b6f2b
SHA256b3ac1c023942aa0d6d446971f6b0319c23b307fcf7ebe3e6729c685fbd0e6fcb
SHA512520db7d116a6ac4edfd93a3aedefc58140c7d5c80160a621a5e1e86c26555aa083ecda2f2d7c6b67cd6e58a2381e74e6140adb6fdab3687161147d901de9b84f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F7755321-CD5E-11EC-A484-C2F2D41BD72F}.dat
Filesize5KB
MD56fce3b4b77f9869389440d253a63f5f1
SHA1f394a007d9027f5c9acc4d99cac42dba94372327
SHA2568957d71d85074a535ccfd8e5714f83e7ff916a73594d4c2474c91ea7c386dd66
SHA512125708584134de853edeb6902bef62b0a774222c44ac7b276e6e8cebde624d1bcdf09680774481e6c1ec281fd8e69b918cc4a128852f1040a0c8038f6a6ebdfe
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{0F810AD0-BC30-11EC-BA3F-F2122C6314CC}.dat
Filesize5KB
MD5c5580a0ffba27df72f7fea2ee1a5c04e
SHA1d8ab61a4c8433e9bfc60ea28ef2a3376140cdddc
SHA256fc970e3e406857161e28c454e962c6a145ce4d0d008b24fca01c39dc54fb2f1f
SHA51277e568e1b43dbed6da1fdaa41509f507c8f20cc227aa793bc64b1a5742f9fbeff343c2e56b28135cddad790b0e68a41c9f4b097dab106f1a2fe3680795634231
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{0F810AD0-BC30-11EC-BA3F-F2122C6314CC}.dat
Filesize6KB
MD543f635e94f74d0dc5c1a1caff5ed6320
SHA1042e163e51716f4aa352a5fd5d841c5caa8096df
SHA2560fa2cc9ee197c49669aaa3e0b5827f443514ec64e510ddb7336da698a2826ead
SHA5128d63114673c0886d8583cd500dc4762856f0f3cf5da4fa616648aa5b97e0e9c6a9353f5f83147dfe231777691ce46bb5370155d8272355b8825752b331e62cbd
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{0F810AD0-BC30-11EC-BA3F-F2122C6314CC}.dat
Filesize7KB
MD59a111b78a0b7fcfcdd70afdcf9e951ed
SHA113b94455c2c9865a0c6ecb8aca10335115a3d9eb
SHA25643134f64b1a389482f20a62df1cc036e226994fe9a28eb6207d907ab904fc697
SHA5124cbf88961a09fae4f5661aa2cb23c4619a9852830768932956f0accd15498c2eaaa1b98b169c593368fa7fbbb52ef9e5b71e61bbe3422950e8e698a70c0bd8e9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{04BA1D44-CD5F-11EC-A484-C2F2D41BD72F}.dat
Filesize4KB
MD51733fc8d01eb7c8e1b2bf226485f2a1e
SHA10cd8af110fac4f905d79a9b11507e12f8d5b35e8
SHA25607954a855bc7a4fa1f6c921d20bd20049a09e53910e082df230f0d9c5fd8bb6c
SHA5125316d1db3fac9d0859144c8746bef6aed0048893569af83345e229841da46a62235554edad14690a7beade4ca1dd7bbe8f04a35059e3d4b9cb6ec7a1a546dac9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{07E10F64-CD5F-11EC-A484-C2F2D41BD72F}.dat
Filesize4KB
MD5131f88139e07f290a8f4d5c5ca6827d4
SHA1fb36f97469145231e686b81e3400fc0f9ee6e86e
SHA256f7460f6e43791a9789af312ab6976ddb1b973aceb3ca6c3bdb42fa535bb15cbb
SHA512edddf9c435236f9fbc2cd61f7a49f2132ab90534a2d5a8f520f2a545f287e69644178237a425fe0dcbe03d1c1cc58d110854b9e027e1be0ae45bdbf798e3b79d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{FD95FD41-CD5E-11EC-A484-C2F2D41BD72F}.dat
Filesize4KB
MD54ab600f9a7f5416257088c1ade01f45f
SHA1cc6763744dfbf1016fc4984cfdb4f64d521fd7e2
SHA2560179c271ab83bd07e41525afc8ddd5a8e2ea64fc29559b49220122bf16e55749
SHA512c2185cb950ce680a89d651fae0603c7805d9efcc59633a7471a3b724d2309b0f2d58f7b046cecefa754367e718514774515a498040b1b286a54eb49d6b811ab2
-
Filesize
77KB
MD587fb2569057619044fce41a2c2124ab1
SHA1fa47071b8710c6c2729ab9aacd21c8f740a276be
SHA256fd2af1adb3038fe25ac3d96e545181f6003ed0f0b8d55d228ef97b580834af92
SHA512308f28fe619cab1832b4170ed079b31a42d6cf14d6624df3ccce5fd7e29a444ad636802237f5a9f3b32a0e78463b80a04ec39ce6c9a113e0f6f0c291d5f230dd
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
Filesize
2KB
MD506dd5a8e167eb2fdab3387d638c0d41a
SHA1a411b42c5f4a588d531ebab7f60ea922cceff579
SHA256868ebde6ef606437d20a076066c0d5b765121a5a59ee3e85ae8da8649846db7e
SHA512cfb91863ab8e537c77350e077e6072a50ebeb42eb0954c38b9428974d02479c3094164f200be5cec6af7bffc8538abdf0693b0d9432d866ca3014a1bde002fd5
-
Filesize
458KB
MD588dd9f9e4ff252c8210d398f72065f6d
SHA104f5b583650a0bb307dcd0c882c40b8517c58e64
SHA256efccb85b4650815e4bfd797524832332b8408d16bb4f2d5b7c5648653a57a10c
SHA512ab41500e74906f5987a49bd5833fe6b9ef28ebcfbf12ca2be475d819973c5e1cf1d81bc75c96b884647d50c2a25ed3e416b6122cfb847a62d3e077a20b3a1a68