Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe
Resource
win10v2004-20220414-en
General
-
Target
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe
-
Size
3.3MB
-
MD5
095408d1abc0817739b86c3e7e4d0dfd
-
SHA1
161d670c99c1ede6f26f97f90532236a0f4a6415
-
SHA256
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182
-
SHA512
c6ecb1dd97007e4a8ad3793a7ea040433bfd26b049540aa989542e9f4ff83417d1f60767441ff59f1236e6208e3eca4c739961c124329fda82da84b7f0d6afdd
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
CLIPPER.exehardware.exeatmlib.exeatmlib.exeatmlib.exeatmlib.exepid process 4808 CLIPPER.exe 916 hardware.exe 1552 atmlib.exe 2784 atmlib.exe 3776 atmlib.exe 3988 atmlib.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
hardware.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hardware.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate hardware.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe -
Modifies file permissions 1 TTPs 9 IoCs
Processes:
icacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 3196 icacls.exe 1548 icacls.exe 4584 icacls.exe 1296 icacls.exe 4220 icacls.exe 1672 icacls.exe 4672 icacls.exe 3476 icacls.exe 2492 icacls.exe -
Processes:
hardware.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hardware.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
hardware.exedescription ioc process File opened for modification \??\PhysicalDrive0 hardware.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe autoit_exe C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe autoit_exe C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exe autoit_exe C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exe autoit_exe C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exe autoit_exe C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
hardware.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier hardware.exe -
Processes:
IEXPLORE.EXEiexplore.exehardware.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\lanzoui.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage hardware.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30961554" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\lanzoui.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1018075854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30961554" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{670A58B0-DB85-11EC-A58B-7E9F925D3B67} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com\NumberOfSubdomains = "1" hardware.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wwa.lanzoui.com\ = "63" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043099a93b0a2dd41b22bfbb30670caee000000000200000000001066000000010000200000006d5d512be6516dac0d99124f0f4585e9e016b8d2f9857dce6c23404c5d7da526000000000e8000000002000020000000beeecbf7dd48a0e062a9a91b1a959be699a0830d2c0acec914cff1561ddf91722000000043f7920b2556f55cfb3c2b602f607c40e515a7f5f1baa2c1cbafecf9060dbbfb400000004fb441acb5fd5e13186885a821e62236d0cbfa223845c023ef1a4bd4a8129c21d2010dac1d7a24cd3d2c1adbb20531dba98db3af037ac7e66b13e1a8c47c40ce iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.virtualhardwares.com\ = "63" hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com\Total = "63" hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "126" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\IESettingSync hardware.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\DOMStorage\wwa.lanzoui.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508f5035926fd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1027919680" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\DOMStorage\lanzoui.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total hardware.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1018075854" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30961554" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "360177635" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\DOMStorage\virtualhardwares.com hardware.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.virtualhardwares.com hardware.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
hardware.exepid process 916 hardware.exe 916 hardware.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
hardware.exedescription pid process Token: SeDebugPrivilege 916 hardware.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2628 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
hardware.exeielowutil.exeiexplore.exeIEXPLORE.EXEpid process 916 hardware.exe 916 hardware.exe 916 hardware.exe 4504 ielowutil.exe 2628 iexplore.exe 2628 iexplore.exe 2628 iexplore.exe 3332 IEXPLORE.EXE 3332 IEXPLORE.EXE 3332 IEXPLORE.EXE 3332 IEXPLORE.EXE 3332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exeCLIPPER.exeatmlib.execmd.execmd.execmd.exeiexplore.exedescription pid process target process PID 3996 wrote to memory of 4808 3996 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe CLIPPER.exe PID 3996 wrote to memory of 4808 3996 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe CLIPPER.exe PID 3996 wrote to memory of 4808 3996 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe CLIPPER.exe PID 3996 wrote to memory of 916 3996 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe hardware.exe PID 3996 wrote to memory of 916 3996 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe hardware.exe PID 3996 wrote to memory of 916 3996 51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe hardware.exe PID 4808 wrote to memory of 1220 4808 CLIPPER.exe cmd.exe PID 4808 wrote to memory of 1220 4808 CLIPPER.exe cmd.exe PID 4808 wrote to memory of 1220 4808 CLIPPER.exe cmd.exe PID 1552 wrote to memory of 1360 1552 atmlib.exe cmd.exe PID 1552 wrote to memory of 1360 1552 atmlib.exe cmd.exe PID 1552 wrote to memory of 1360 1552 atmlib.exe cmd.exe PID 1220 wrote to memory of 1548 1220 cmd.exe icacls.exe PID 1220 wrote to memory of 1548 1220 cmd.exe icacls.exe PID 1220 wrote to memory of 1548 1220 cmd.exe icacls.exe PID 1360 wrote to memory of 3196 1360 cmd.exe icacls.exe PID 1360 wrote to memory of 3196 1360 cmd.exe icacls.exe PID 1360 wrote to memory of 3196 1360 cmd.exe icacls.exe PID 1552 wrote to memory of 5040 1552 atmlib.exe cmd.exe PID 1552 wrote to memory of 5040 1552 atmlib.exe cmd.exe PID 1552 wrote to memory of 5040 1552 atmlib.exe cmd.exe PID 1360 wrote to memory of 4584 1360 cmd.exe icacls.exe PID 1360 wrote to memory of 4584 1360 cmd.exe icacls.exe PID 1360 wrote to memory of 4584 1360 cmd.exe icacls.exe PID 1220 wrote to memory of 4672 1220 cmd.exe icacls.exe PID 1220 wrote to memory of 4672 1220 cmd.exe icacls.exe PID 1220 wrote to memory of 4672 1220 cmd.exe icacls.exe PID 5040 wrote to memory of 4220 5040 cmd.exe icacls.exe PID 5040 wrote to memory of 4220 5040 cmd.exe icacls.exe PID 5040 wrote to memory of 4220 5040 cmd.exe icacls.exe PID 1360 wrote to memory of 1296 1360 cmd.exe icacls.exe PID 1360 wrote to memory of 1296 1360 cmd.exe icacls.exe PID 1360 wrote to memory of 1296 1360 cmd.exe icacls.exe PID 1220 wrote to memory of 3476 1220 cmd.exe icacls.exe PID 1220 wrote to memory of 3476 1220 cmd.exe icacls.exe PID 1220 wrote to memory of 3476 1220 cmd.exe icacls.exe PID 5040 wrote to memory of 1672 5040 cmd.exe icacls.exe PID 5040 wrote to memory of 1672 5040 cmd.exe icacls.exe PID 5040 wrote to memory of 1672 5040 cmd.exe icacls.exe PID 5040 wrote to memory of 2492 5040 cmd.exe icacls.exe PID 5040 wrote to memory of 2492 5040 cmd.exe icacls.exe PID 5040 wrote to memory of 2492 5040 cmd.exe icacls.exe PID 2628 wrote to memory of 3332 2628 iexplore.exe IEXPLORE.EXE PID 2628 wrote to memory of 3332 2628 iexplore.exe IEXPLORE.EXE PID 2628 wrote to memory of 3332 2628 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe"C:\Users\Admin\AppData\Local\Temp\51bf33a62aa0ea28abaf917f1f82da3823b2ea31e04c6d122a96f7dbde4a2182.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe"C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "Admin:(R,REA,RA,RD)"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "Admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Roaming\Z21754918\hardware.exe"C:\Users\Admin\AppData\Roaming\Z21754918\hardware.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "Admin:(R,REA,RA,RD)"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "Admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "Admin:(R,REA,RA,RD)"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661" /inheritance:e /deny "Admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exe1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exeC:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD53c94b790a4d3d3813b9804b360811c02
SHA19b42bca99be723330c45b22abb0698f77ef8077a
SHA2567bc88a561babff736195edc916e12556d4a870e9dc94e649adff7d6859468d93
SHA512594410b019fde2552e456bf87934eab332c73d5a1c73c3fac27886bb2c8f2b2c174acb0fa5f67b40a4b41339cff713b239eab680c6dd7aab00aacaf8e38538b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A053CFB63FC8E6507871752236B5CCD5_CEC273363E767B922208DE98D79F0556Filesize
1KB
MD5353ea810c544d9b8d2c0abc88e93a655
SHA1eb960990003221fab9efcf67e46732d831f77d39
SHA25625a720f1fb0b266a93f9dc30c307066f9b8dca2bb334c4f0f5e208297eacb6e7
SHA5125a43748ea7e51a0719c9bee698f96b2f03660b11ac839a3b6f8f8c7cd2e69699a1df7382b64e37293c4d98fd42dd9f22e72b4d2254cc2eae2afeb5042e4e3649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
1KB
MD52a9342e928868b3aa3cb44335e149475
SHA14528e096dd8f508a3f47bc98c6fe500be94cab63
SHA25681a11d126e503c3c20af7f8456b464e0396685a9605bce321e68f2beafa05529
SHA5123766a4e288cbb1933ad0586603dae0a24918460d50e9ad7f92df41edb599c1489f9ba2a28b1406709277bb6a446989605a74a6d0b547e5d53686ed51767b87c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD513a3bac60000fa5c6c6f3ddcb9808375
SHA1083314ecf5cdbc666740bf51512a8fcc0f037561
SHA256bb3456c31b0d6039f527967b0dbacd2662de01f2fff437f871e8338d300c3a7d
SHA51230d4d6919cb069a560f3c0a031e4c3707aedebdb3501413c5424c32136daa4a2bb978641057fe1fe87b2d435681e34b16f25e02e452f257fd94018b0b2b6a1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A053CFB63FC8E6507871752236B5CCD5_CEC273363E767B922208DE98D79F0556Filesize
540B
MD5fb329cf4ac524e9ccd1e95b81ea50481
SHA16dd91a68be3059faab9c537e7661fd6215c7a22f
SHA2568c352b868393f9f2937275a6244c2a7b4ac4b2b96816811776db7a64c939b5e9
SHA512d909e980f01c61bf5f96f466f1149af31f4b178db2fb7385b4e7032ba0bbabe15fb894668f08a7cb442b12e2e2c0e3e17e3031acf88401ec4b2fd49186672223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
492B
MD563a720ff6ee0adcb99a0d69ae0758bdc
SHA10e84906461f1a5c8eb5be54519a7714d4caa4404
SHA2563956620cd675137bfc7c82475a73b43c77b98bae212d469d45ac0a5fc60b23d4
SHA51249beb396ce662e8843a709955e9137d9de0417953ffefab4a89ac27ce57cb05af8cba5baeced62214c11c5c8c5f4df97b8f2b015ef3fc639968ca93e27d68660
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\a5473fd\imagestore.datFilesize
1KB
MD576b14915623b07f55ad1786c5adf1618
SHA1d6cda310dd42b68930739958eb5ec9e33dd778f4
SHA256ce337008545e8dc060e455eea24328215e18b6dab3f9dcf56d9d2a4cc9b750c6
SHA512d5a36357b84fdca0bf7720af228d1c39fccb489e5abc0cd82f330dba1f2a1204af3990659d68c9eb9e4fccf395f43d91bc85432ab7db354ff31fd701b2d38443
-
C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
C:\Users\Admin\AppData\Roaming\Z21754918\CLIPPER.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
C:\Users\Admin\AppData\Roaming\Z21754918\hardware.exeFilesize
2.0MB
MD51c4a6c4af547084522341fd581796e7b
SHA1465609a615eb247b83d011317943f30ceeb46904
SHA256e1ae2039b5fa61865bdd9d46c12b9523ff96b52560d2232a12a36129b5621a1e
SHA512186e80059859f885feb983e6f99c2e4c57fd50d7314716a3b28db31886bc88a583113e2c1ec3a1ec99de8a1fdd085f51492ba35945d852b12bfe90671a349068
-
C:\Users\Admin\AppData\Roaming\Z21754918\hardware.exeFilesize
2.0MB
MD51c4a6c4af547084522341fd581796e7b
SHA1465609a615eb247b83d011317943f30ceeb46904
SHA256e1ae2039b5fa61865bdd9d46c12b9523ff96b52560d2232a12a36129b5621a1e
SHA512186e80059859f885feb983e6f99c2e4c57fd50d7314716a3b28db31886bc88a583113e2c1ec3a1ec99de8a1fdd085f51492ba35945d852b12bfe90671a349068
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
C:\Users\Admin\AppData\Roaming\amd64_microsoft-windows-t..linetools.resources_31bf3856ad364e35_10.0.17763.1_ru-ru_beb9970b5fb42661\atmlib.exeFilesize
978KB
MD5c19991ba8335387ae24c6cd7ef25e9d4
SHA16464ef5c79840112e56bd733b2fd6db599f46467
SHA256bca3c1292b0beafbd725258334d59de4c97f4f8aca77bed161da7f1733d1a6fb
SHA512f12d32dd3f2209f4a672b7efd8630f7a92f306a02031714bc3b73bb2ffadf070eb668d2b40b5eb884e67bdfdda256e13db390c7e994465989395fc182a80b2d3
-
memory/916-133-0x0000000000000000-mapping.dmp
-
memory/1220-136-0x0000000000000000-mapping.dmp
-
memory/1296-146-0x0000000000000000-mapping.dmp
-
memory/1360-139-0x0000000000000000-mapping.dmp
-
memory/1548-140-0x0000000000000000-mapping.dmp
-
memory/1672-148-0x0000000000000000-mapping.dmp
-
memory/2492-149-0x0000000000000000-mapping.dmp
-
memory/3196-141-0x0000000000000000-mapping.dmp
-
memory/3476-147-0x0000000000000000-mapping.dmp
-
memory/4220-145-0x0000000000000000-mapping.dmp
-
memory/4584-143-0x0000000000000000-mapping.dmp
-
memory/4672-144-0x0000000000000000-mapping.dmp
-
memory/4808-130-0x0000000000000000-mapping.dmp
-
memory/5040-142-0x0000000000000000-mapping.dmp