Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 09:56
Static task
static1
Behavioral task
behavioral1
Sample
210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe
Resource
win10v2004-20220414-en
General
-
Target
210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe
-
Size
616KB
-
MD5
56574c4691f454ea2c19454b7fc40905
-
SHA1
cbbfd3d72456c071ceef8ff4bf84106ca1062c6f
-
SHA256
210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43
-
SHA512
81f0de49b8e96d6422fb0f92f0799cac469d840b35e5f1ff48f9b2ae56104983ab4a17633def840868cd3c5db7b729d2f72d9f65590dfa0efcc95ba0b8980cdb
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\Recovery+rxjeg.txt
http://p57gest54celltraf743knjf.mottesapo.com/ED38BE9A2396F05A
http://k4restportgonst34d23r.oftpony.at/ED38BE9A2396F05A
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/ED38BE9A2396F05A
http://fwgrhsao3aoml7ej.onion/ED38BE9A2396F05A
http://fwgrhsao3aoml7ej.ONION/ED38BE9A2396F05A
Signatures
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 3 IoCs
Processes:
mmtovalitqqm.exemmtovalitqqm.exeyrapn.exepid process 1984 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1476 yrapn.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 588 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
mmtovalitqqm.exepid process 1728 mmtovalitqqm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mmtovalitqqm.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run mmtovalitqqm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\12_23-dst = "C:\\Windows\\mmtovalitqqm.exe" mmtovalitqqm.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exemmtovalitqqm.exedescription pid process target process PID 732 set thread context of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 1984 set thread context of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe -
Drops file in Program Files directory 64 IoCs
Processes:
mmtovalitqqm.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\1047x576black.png mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\sports_disc_mask.png mmtovalitqqm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\nb.pak mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonInset_Alpha2.png mmtovalitqqm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\Recovery+rxjeg.png mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\pushplaysubpicture.png mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_ButtonGraphic.png mmtovalitqqm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\Recovery+rxjeg.png mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Recovery+rxjeg.png mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\Recovery+rxjeg.png mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\en-US\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\7-Zip\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\es-ES\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_ButtonGraphic.png mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoDev.png mmtovalitqqm.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\Recovery+rxjeg.png mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ar.pak mmtovalitqqm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es.pak mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\bandwidth.png mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\ffjcext.zip mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\MainMenuButtonIcon.png mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\colorcycle.png mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_ButtonGraphic.png mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\System\ado\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\15x15dot.png mmtovalitqqm.exe File opened for modification C:\Program Files\Internet Explorer\Recovery+rxjeg.png mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_ButtonGraphic.png mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\Recovery+rxjeg.png mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_glass.png mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\Recovery+rxjeg.html mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-over-select.png mmtovalitqqm.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\Recovery+rxjeg.txt mmtovalitqqm.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_notes.wmv mmtovalitqqm.exe -
Drops file in Windows directory 2 IoCs
Processes:
210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exedescription ioc process File created C:\Windows\mmtovalitqqm.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe File opened for modification C:\Windows\mmtovalitqqm.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1820 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mmtovalitqqm.exepid process 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe 1728 mmtovalitqqm.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exemmtovalitqqm.exevssvc.exedescription pid process Token: SeDebugPrivilege 1072 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe Token: SeDebugPrivilege 1728 mmtovalitqqm.exe Token: SeBackupPrivilege 1652 vssvc.exe Token: SeRestorePrivilege 1652 vssvc.exe Token: SeAuditPrivilege 1652 vssvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exemmtovalitqqm.exepid process 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 1984 mmtovalitqqm.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exemmtovalitqqm.exemmtovalitqqm.exeyrapn.exedescription pid process target process PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 732 wrote to memory of 1072 732 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe PID 1072 wrote to memory of 1984 1072 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe mmtovalitqqm.exe PID 1072 wrote to memory of 1984 1072 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe mmtovalitqqm.exe PID 1072 wrote to memory of 1984 1072 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe mmtovalitqqm.exe PID 1072 wrote to memory of 1984 1072 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe mmtovalitqqm.exe PID 1072 wrote to memory of 588 1072 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe cmd.exe PID 1072 wrote to memory of 588 1072 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe cmd.exe PID 1072 wrote to memory of 588 1072 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe cmd.exe PID 1072 wrote to memory of 588 1072 210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe cmd.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1984 wrote to memory of 1728 1984 mmtovalitqqm.exe mmtovalitqqm.exe PID 1728 wrote to memory of 1476 1728 mmtovalitqqm.exe yrapn.exe PID 1728 wrote to memory of 1476 1728 mmtovalitqqm.exe yrapn.exe PID 1728 wrote to memory of 1476 1728 mmtovalitqqm.exe yrapn.exe PID 1728 wrote to memory of 1476 1728 mmtovalitqqm.exe yrapn.exe PID 1476 wrote to memory of 1820 1476 yrapn.exe vssadmin.exe PID 1476 wrote to memory of 1820 1476 yrapn.exe vssadmin.exe PID 1476 wrote to memory of 1820 1476 yrapn.exe vssadmin.exe PID 1476 wrote to memory of 1820 1476 yrapn.exe vssadmin.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
mmtovalitqqm.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mmtovalitqqm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mmtovalitqqm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe"C:\Users\Admin\AppData\Local\Temp\210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe"C:\Users\Admin\AppData\Local\Temp\210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\mmtovalitqqm.exeC:\Windows\mmtovalitqqm.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\mmtovalitqqm.exeC:\Windows\mmtovalitqqm.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1728 -
C:\Users\Admin\Documents\yrapn.exeC:\Users\Admin\Documents\yrapn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet6⤵
- Interacts with shadow copies
PID:1820
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\210223~1.EXE3⤵
- Deletes itself
PID:588
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD534d3f2e3fd92cd38a103d415dbb22936
SHA1abdcf16a82cf8d3109ec39203181d839f2154a68
SHA2565119839eaaf7dfc670c7d2c8a83e74f895e07fab5f22c379185769eed07ece25
SHA512bc76ed0fe69ab38f66217f4b4aec79947e706136aecc5a42840ccd963799c8c175dc796d92be678b2b1e55d22c3a97fb4b9e00f6879958ae5a5bb2081ae7ad92
-
Filesize
616KB
MD556574c4691f454ea2c19454b7fc40905
SHA1cbbfd3d72456c071ceef8ff4bf84106ca1062c6f
SHA256210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43
SHA51281f0de49b8e96d6422fb0f92f0799cac469d840b35e5f1ff48f9b2ae56104983ab4a17633def840868cd3c5db7b729d2f72d9f65590dfa0efcc95ba0b8980cdb
-
Filesize
616KB
MD556574c4691f454ea2c19454b7fc40905
SHA1cbbfd3d72456c071ceef8ff4bf84106ca1062c6f
SHA256210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43
SHA51281f0de49b8e96d6422fb0f92f0799cac469d840b35e5f1ff48f9b2ae56104983ab4a17633def840868cd3c5db7b729d2f72d9f65590dfa0efcc95ba0b8980cdb
-
Filesize
616KB
MD556574c4691f454ea2c19454b7fc40905
SHA1cbbfd3d72456c071ceef8ff4bf84106ca1062c6f
SHA256210223de4b6b3fb33d879ffb7df1e6b6cc7223f24603b2296852066ee3db3f43
SHA51281f0de49b8e96d6422fb0f92f0799cac469d840b35e5f1ff48f9b2ae56104983ab4a17633def840868cd3c5db7b729d2f72d9f65590dfa0efcc95ba0b8980cdb
-
Filesize
5KB
MD534d3f2e3fd92cd38a103d415dbb22936
SHA1abdcf16a82cf8d3109ec39203181d839f2154a68
SHA2565119839eaaf7dfc670c7d2c8a83e74f895e07fab5f22c379185769eed07ece25
SHA512bc76ed0fe69ab38f66217f4b4aec79947e706136aecc5a42840ccd963799c8c175dc796d92be678b2b1e55d22c3a97fb4b9e00f6879958ae5a5bb2081ae7ad92