Analysis
-
max time kernel
1800s -
max time network
1613s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-06-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe
Resource
win7-20220414-en
General
-
Target
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe
-
Size
2.0MB
-
MD5
818fc5aa272e4ab7e0209916686f5525
-
SHA1
d4db5757339e5943b1012a008feb1ec8ad9ddd5b
-
SHA256
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362
-
SHA512
ca81fe247ca70b41a34bb43c37215e0fa3b94bac33e231886ce150fd9b635bb415215e08781a6d272355f27699dd79caf052a36b249073e53755b52a6f223d7a
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
suricata: ET MALWARE Win32.Sality-GR Checkin
suricata: ET MALWARE Win32.Sality-GR Checkin
-
Blocklisted process makes network request 2 IoCs
Processes:
mshta.execscript.exeflow pid process 14 1296 mshta.exe 16 1696 cscript.exe -
Processes:
resource yara_rule behavioral1/memory/1852-55-0x0000000002670000-0x00000000036FE000-memory.dmp upx behavioral1/memory/1852-56-0x0000000000400000-0x0000000000934000-memory.dmp upx behavioral1/memory/1852-57-0x0000000002670000-0x00000000036FE000-memory.dmp upx behavioral1/memory/1852-81-0x0000000000400000-0x0000000000934000-memory.dmp upx behavioral1/memory/1852-82-0x0000000002670000-0x00000000036FE000-memory.dmp upx -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Wine e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process File opened (read-only) \??\Y: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\I: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\M: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\P: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\V: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\T: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\X: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\Z: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\E: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\H: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\J: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\S: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\R: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\W: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\G: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\L: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\O: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\Q: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\F: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\K: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\N: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened (read-only) \??\U: e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ip-api.com -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process File opened for modification C:\autorun.inf e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Drops file in Program Files directory 64 IoCs
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\servertool.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\rmiregistry.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\orbd.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\rmid.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\wsgen.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\ssvagent.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\unpack200.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\appletviewer.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\javadoc.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\servertool.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\wsimport.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\ssvagent.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\tnameserv.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\ktab.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\javac.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\GOOGLE\CHROME\APPLICATION\chrome_proxy.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\jabswitch.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\rmic.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\xjc.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\javaws.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\VSTO\10.0\VSTOInstaller.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\GOOGLE\CHROME\APPLICATION\89.0.4389.114\chrome_pwa_launcher.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\javaw.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\javaws.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\klist.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\keytool.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\unpack200.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\LIB\launcher.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\jps.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\policytool.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\rmiregistry.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\kinit.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\jconsole.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\javaws.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\javap.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\unpack200.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\jp2launcher.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\java.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\serialver.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\servertool.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\jsadebugd.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\javafxpackager.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\pack200.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\LIB\VISUALVM\PLATFORM\LIB\nbexec64.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\apt.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\jabswitch.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\javaw.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\jp2launcher.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\tnameserv.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\idlj.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\java-rmi.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\jrunscript.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\rmid.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\BIN\policytool.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\java-rmi.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\javah.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\javaw.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\pack200.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\LIB\VISUALVM\PLATFORM\LIB\nbexec.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\java-rmi.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\orbd.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe File opened for modification C:\PROGRAM FILES\JAVA\JRE7\BIN\pack200.exe e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Drops file in Windows directory 1 IoCs
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 2 IoCs
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\FalconBetaAccount e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\FalconBetaAccount\remote_access_client_id = "7103143026" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exepid process 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription pid process Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeManageVolumePrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Token: SeDebugPrivilege 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exemshta.exedescription pid process target process PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1296 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe mshta.exe PID 1852 wrote to memory of 1296 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe mshta.exe PID 1852 wrote to memory of 1296 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe mshta.exe PID 1852 wrote to memory of 1296 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe mshta.exe PID 1296 wrote to memory of 1712 1296 mshta.exe cscript.exe PID 1296 wrote to memory of 1712 1296 mshta.exe cscript.exe PID 1296 wrote to memory of 1712 1296 mshta.exe cscript.exe PID 1296 wrote to memory of 1712 1296 mshta.exe cscript.exe PID 1296 wrote to memory of 1740 1296 mshta.exe PING.EXE PID 1296 wrote to memory of 1740 1296 mshta.exe PING.EXE PID 1296 wrote to memory of 1740 1296 mshta.exe PING.EXE PID 1296 wrote to memory of 1740 1296 mshta.exe PING.EXE PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1296 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe mshta.exe PID 1852 wrote to memory of 1296 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe mshta.exe PID 1296 wrote to memory of 1696 1296 mshta.exe cscript.exe PID 1296 wrote to memory of 1696 1296 mshta.exe cscript.exe PID 1296 wrote to memory of 1696 1296 mshta.exe cscript.exe PID 1296 wrote to memory of 1696 1296 mshta.exe cscript.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE PID 1852 wrote to memory of 1896 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe DllHost.exe PID 1852 wrote to memory of 1248 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe taskhost.exe PID 1852 wrote to memory of 1332 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Dwm.exe PID 1852 wrote to memory of 1384 1852 e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe"C:\Users\Admin\AppData\Local\Temp\e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Identifies Wine through registry keys
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1852 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\index.hta?utorrent" "C:\Users\Admin\AppData\Local\Temp\e0c494dab64f42c19ddb7eaba973423c7ef2996104e6cc6b70dc269292ac8362.exe" /LOG "C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\index.hta.log" /PID "1852" /CID "8q8-_3NNAYaAyyQ3" /VERSION "111915098" /BUCKET "0" /SSB "2" /COUNTRY "US" /OS "6.1" /BROWSERS "\"C:\Program Files\Mozilla Firefox\firefox.exe\",\"C:\Program Files\Google\Chrome\Application\chrome.exe\",C:\Program Files\Internet Explorer\iexplore.exe" /ARCHITECTURE "64" /LANG "en" /USERNAME "Admin" /SID "S-1-5-21-1083475884-596052423-1669053738-1000" /CLIENT "utorrent"3⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\System32\cscript.exe" "shell_scripts/check_if_cscript_is_working.js"4⤵PID:1712
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\System32\PING.EXE" 8.8.8.8 -n 2 -w 5004⤵
- Runs ping.exe
PID:1740 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\System32\cscript.exe" shell_scripts/shell_ping_after_close.js "http://i-50.b-000.XYZ.bench.utorrent.com/e?i=50&e=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"4⤵
- Blocklisted process makes network request
PID:1696
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1332
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1896
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:932
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Install Root Certificate
1Modify Registry
7Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\i18n\en.jsonFilesize
5KB
MD54417dbfa9fce94752a5a2dfdc823cb92
SHA112d2fd479d85b3f26c28351bbd0e44f06bc60597
SHA2562381252b689d7ef2a8e1dcea6b7366c0436e70ff29e9b63f3ae34bcc5c60aaf5
SHA512922c3e44db618cb2a77ad8ae6cceeaaecda3acf47034dcfe620cc5c352bededa6e4c983c74a05a797bcbed4f595d205f21829e3393b8994feb73f8179494a93c
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\images\loading.gifFilesize
5KB
MD5c910e2a5db424644aead18e1758c5efd
SHA1fa58fc1a0c17db6c0eb573a0d548e544604114da
SHA25600c62ed42795f996b5f963c69ce918c2623d72896ebb628dfd9bc800514900ce
SHA51266d87ba337fc672f3f2fac50e2b32774b3a470b32fe5ba1a0e887bf74465e3db1375eca3cab91367bf88b2c6fbf0301e11d6f64c90dddc0c972fabeaefd37b7e
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\images\main_icon.pngFilesize
3KB
MD5e29ae2c3347790175085244651c40d6a
SHA10b9a15b6791439b319496950b85ab82dc2e3e5ae
SHA256639bccb6ed0fce165cc979a2949d211ec8f1570133d644bf042a5400c3454c21
SHA51253287d741b18275ee35eb4c4392c452e25846748ccaf3954a57f017a6e844b25ec4a39438c6ed7b24128138b8d7239cfacf69112f9803ab9d2ee981ea97a9808
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\images\main_utorrent.icoFilesize
104KB
MD544d122c9473107fc36412de81418c84a
SHA1a0072c789a9cd50ba561683c69af8602927cf4a8
SHA2567c7279daebd88f6a34246603db9c0ecf9bbfa35ef820edd3278e5bc53f9e7680
SHA512b4294b80edc0566744dd98a5ab3e2ac64a4ce4851192d5610ee13f12dc24947f51b7d5b5629f7bff6004d74e5a2b728913cda1b3386cf878ab7fb365490d8067
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\index.htaFilesize
522B
MD576903930c0ade2285f1ab1bf54be660d
SHA10fdd5990ca58cf6c49985ffd2075baa09cd728ce
SHA25661acd6e7405fad348433f8de4b12ed97b42caccbcf28fe0e4ba4b4a5d2ea707e
SHA512c66c7f9f488a0ac58fc1b7c6560edb4bc6df71a3504c2567ac54f4f89aee40a7073865e67e508baf4e055555bbc2f461d5b558a427ab6ac602b9fe0b1f9f8c71
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\scripts\common.jsFilesize
354KB
MD5294704ab62d0810ce15a39d08c8b1bf4
SHA19eb74fbb3eb81e6312c94ec4e3e84792e1a0aa68
SHA256f6332951011366de16da034680ca2eaf06d28171aa094ed42af649823b045bdd
SHA512a622b8109a5b09961dd18761abeb701b3a2956967a8373e1ea3e4648a5a0d7427f37b7d0f0e3635aad452f43d0754d30ddeeac5def88a554ad655f174d60faff
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\scripts\initialize.jsFilesize
1005B
MD52a65c76b51a2c15eebeefa662d511af9
SHA13c5f93d39fdd573e43c7a451836d425bc1b07a5d
SHA25631fc706ae4bd5093aecb6a0b7f9d3b686feb284076b1122aaff978779612dc06
SHA51285b012dca5bbdbdd929de859ae41ed817c7f1e02eae70aaaf687f9ba381f696fa7751e3f2262d48c14f49c9090f106a6bb9652962d38bb7fab93214a2466e8ed
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\scripts\install.jsFilesize
6KB
MD5ade3e833add95bf0f5f1619bf816d893
SHA148df3ae9a43c6d8783dab68ec423a9ff8ab25c04
SHA256bbbf5859eb80eda10d42aee0557256d161768f1db7648f65a12444fc40fb8f1d
SHA5128ed6005f9801ad5e7108ca698f65f7e31ecd842ca3fc9c1086f9cd247896b2ed59c8d5aaf62ad33e96e67837757814510ce058b5ce1cbdec461453799f9abf26
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\shell_scripts\check_if_cscript_is_working.jsFilesize
18B
MD5401b092610275ba2a62376598bfd9c6b
SHA1da1173bc19dd51759f06ac21237a1e8af19d96e7
SHA256d1b9d32702d7d7a184ab4654c204e6d385a9499fde63e0b06bda60f8077a7862
SHA5124a6b34a572864c8648ae1d3e2fe7b3ae2caada78cac726fafe4fe840afdeac1b53ea161ef27abe82ed6843e61bf853901a2d1bdf2ec255de0c395423d1b2e865
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\shell_scripts\shell_ping_after_close.jsFilesize
312B
MD53ba92505f8af34e948f97360767d4f8a
SHA1997a36be9f9f5262195b24c8c99c0688086c80ee
SHA2565e872715109b381c99aa19e2435628640505794e09a1998de7b92c2a5aea38e1
SHA512b33d3519684e3b54e582e401c7144d4d3783ac44ee73e8d9ce2d92b2e0a091758d330d966ab7db19f7d22fe18335d3e8effc0961ff9d9c4ac147d0ec2c91e626
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\HTA\styles\common.cssFilesize
99KB
MD58a94d780401556cceabf35058bbd4b5a
SHA119ee91b1629f4ccf0fca1f664405a1eee9dacc5a
SHA256086a7e44de35a235bc258bf1107e22a7dc27932cb4d7e3ebcd1f368acc000caa
SHA512b02fdc9b46f6fa8424660f462bb290c60c0635ad5cb9fa1b386a55d85d4368d06ae5611d355f8dc0db76477c2e332b0501e70cbbba77c45aa027e1cac59ca182
-
C:\Users\Admin\AppData\Local\Temp\HYD7B0.tmp.1654593412\index.hta.logFilesize
57B
MD5928ae7898c45b2c47caaad9a3db6c95e
SHA121e94e33febda47ecb4fa10d9ec46f8c18e8605e
SHA256971e66c4bfb59aa581c2322c26b8227b9bbbf4a82456eb97b2f015c18af9ef2c
SHA512de7d1940c3ba652476a9e6eb68781f1d485b2f65477fc82a65bb5788b95a0075faeb13390fffd2921bade22947d69ddb62e615118159782a5fa5801a39731c6e
-
memory/1296-74-0x00000000081B0000-0x00000000086E4000-memory.dmpFilesize
5.2MB
-
memory/1296-86-0x00000000067D0000-0x0000000006994000-memory.dmpFilesize
1.8MB
-
memory/1296-84-0x00000000081B0000-0x00000000086E4000-memory.dmpFilesize
5.2MB
-
memory/1296-59-0x0000000000000000-mapping.dmp
-
memory/1296-77-0x00000000067D0000-0x0000000006994000-memory.dmpFilesize
1.8MB
-
memory/1296-75-0x00000000081B0000-0x00000000086E4000-memory.dmpFilesize
5.2MB
-
memory/1696-78-0x0000000000000000-mapping.dmp
-
memory/1712-67-0x0000000000000000-mapping.dmp
-
memory/1740-70-0x0000000000000000-mapping.dmp
-
memory/1852-76-0x0000000005330000-0x0000000005337000-memory.dmpFilesize
28KB
-
memory/1852-58-0x0000000000280000-0x0000000000282000-memory.dmpFilesize
8KB
-
memory/1852-55-0x0000000002670000-0x00000000036FE000-memory.dmpFilesize
16.6MB
-
memory/1852-56-0x0000000000400000-0x0000000000934000-memory.dmpFilesize
5.2MB
-
memory/1852-81-0x0000000000400000-0x0000000000934000-memory.dmpFilesize
5.2MB
-
memory/1852-83-0x0000000000280000-0x0000000000282000-memory.dmpFilesize
8KB
-
memory/1852-82-0x0000000002670000-0x00000000036FE000-memory.dmpFilesize
16.6MB
-
memory/1852-57-0x0000000002670000-0x00000000036FE000-memory.dmpFilesize
16.6MB
-
memory/1852-85-0x0000000005330000-0x0000000005337000-memory.dmpFilesize
28KB
-
memory/1852-54-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB