Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14/06/2022, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20220414-en
General
-
Target
sample.exe
-
Size
452KB
-
MD5
aa8a80fba6bf763cf203df243cc67e32
-
SHA1
5472dedcc20a5b341c11834799901bbb06080bfd
-
SHA256
1f0841edf877133a15a931a6d98eb84d83657b9f64e4395fdbf4988b1579073d
-
SHA512
58ae8e054df8f0d8b7a686d1a95d094ebb8330531da6ecf2d43b3b278a6b3c0378aa5c2609c36f0a4f1e96a204def392a6b6e5ae92c46be5c9a6ff1234b9f89f
Malware Config
Extracted
C:\TEMP\readmee.txt
13WDsG32nT9TvaK2uc24Pk8WLLejKTPXJL
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1108 zzz.exe 704 zzz.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zzz.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zzz.exe cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1392 sample.exe 1392 sample.exe 1392 sample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B8CA571-EBC4-11EC-A33B-DE95627D9645} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c97144d17fd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AE431E1-EBC4-11EC-A33B-DE95627D9645} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "361963914" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000850f07ecb424934d8f5a48a59e73cec000000000020000000000106600000001000020000000ca1561bf4ab92f89a983be025c8e272d6177e9665e7d17fdcc008a9f33d1b71c000000000e8000000002000020000000c7b5eb68680d4190f96286f260b35a6e4956a9b39c12c2020a5202e0dee5f57820000000b3523d4e0d215031dacdc2d993515ae8d8231703233ce7e087f37f266680fbc840000000401f3e941fa53e47036ed107a7ecad90a97ebb8836b0934de2696b2ee0ce8c49a88c3d1f0d237aa79403db4f2b95212a81632555262c600e3cabf379c50ea327 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Opens file in notepad (likely ransom note) 7 IoCs
pid Process 2560 NOTEPAD.EXE 696 NOTEPAD.EXE 1668 NOTEPAD.EXE 1012 NOTEPAD.EXE 2092 NOTEPAD.EXE 2252 NOTEPAD.EXE 2412 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1804 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1804 AUDIODG.EXE Token: 33 1804 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1804 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 568 iexplore.exe 1208 iexplore.exe 1668 NOTEPAD.EXE 240 iexplore.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 568 iexplore.exe 568 iexplore.exe 856 IEXPLORE.EXE 856 IEXPLORE.EXE 856 IEXPLORE.EXE 856 IEXPLORE.EXE 1208 iexplore.exe 1208 iexplore.exe 436 IEXPLORE.EXE 436 IEXPLORE.EXE 240 iexplore.exe 240 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1952 1392 sample.exe 27 PID 1392 wrote to memory of 1952 1392 sample.exe 27 PID 1392 wrote to memory of 1952 1392 sample.exe 27 PID 1392 wrote to memory of 1952 1392 sample.exe 27 PID 1392 wrote to memory of 1108 1392 sample.exe 29 PID 1392 wrote to memory of 1108 1392 sample.exe 29 PID 1392 wrote to memory of 1108 1392 sample.exe 29 PID 1392 wrote to memory of 1108 1392 sample.exe 29 PID 1108 wrote to memory of 904 1108 zzz.exe 30 PID 1108 wrote to memory of 904 1108 zzz.exe 30 PID 1108 wrote to memory of 904 1108 zzz.exe 30 PID 1108 wrote to memory of 904 1108 zzz.exe 30 PID 904 wrote to memory of 1220 904 WScript.exe 31 PID 904 wrote to memory of 1220 904 WScript.exe 31 PID 904 wrote to memory of 1220 904 WScript.exe 31 PID 904 wrote to memory of 1220 904 WScript.exe 31 PID 1220 wrote to memory of 568 1220 cmd.exe 33 PID 1220 wrote to memory of 568 1220 cmd.exe 33 PID 1220 wrote to memory of 568 1220 cmd.exe 33 PID 1220 wrote to memory of 568 1220 cmd.exe 33 PID 1220 wrote to memory of 696 1220 cmd.exe 34 PID 1220 wrote to memory of 696 1220 cmd.exe 34 PID 1220 wrote to memory of 696 1220 cmd.exe 34 PID 1220 wrote to memory of 696 1220 cmd.exe 34 PID 568 wrote to memory of 856 568 iexplore.exe 36 PID 568 wrote to memory of 856 568 iexplore.exe 36 PID 568 wrote to memory of 856 568 iexplore.exe 36 PID 568 wrote to memory of 856 568 iexplore.exe 36 PID 904 wrote to memory of 288 904 WScript.exe 38 PID 904 wrote to memory of 288 904 WScript.exe 38 PID 904 wrote to memory of 288 904 WScript.exe 38 PID 904 wrote to memory of 288 904 WScript.exe 38 PID 288 wrote to memory of 1208 288 cmd.exe 40 PID 288 wrote to memory of 1208 288 cmd.exe 40 PID 288 wrote to memory of 1208 288 cmd.exe 40 PID 288 wrote to memory of 1208 288 cmd.exe 40 PID 288 wrote to memory of 1668 288 cmd.exe 41 PID 288 wrote to memory of 1668 288 cmd.exe 41 PID 288 wrote to memory of 1668 288 cmd.exe 41 PID 288 wrote to memory of 1668 288 cmd.exe 41 PID 1208 wrote to memory of 436 1208 iexplore.exe 42 PID 1208 wrote to memory of 436 1208 iexplore.exe 42 PID 1208 wrote to memory of 436 1208 iexplore.exe 42 PID 1208 wrote to memory of 436 1208 iexplore.exe 42 PID 904 wrote to memory of 1552 904 WScript.exe 43 PID 904 wrote to memory of 1552 904 WScript.exe 43 PID 904 wrote to memory of 1552 904 WScript.exe 43 PID 904 wrote to memory of 1552 904 WScript.exe 43 PID 1552 wrote to memory of 240 1552 cmd.exe 45 PID 1552 wrote to memory of 240 1552 cmd.exe 45 PID 1552 wrote to memory of 240 1552 cmd.exe 45 PID 1552 wrote to memory of 240 1552 cmd.exe 45 PID 1552 wrote to memory of 1012 1552 cmd.exe 46 PID 1552 wrote to memory of 1012 1552 cmd.exe 46 PID 1552 wrote to memory of 1012 1552 cmd.exe 46 PID 1552 wrote to memory of 1012 1552 cmd.exe 46 PID 240 wrote to memory of 1688 240 iexplore.exe 47 PID 240 wrote to memory of 1688 240 iexplore.exe 47 PID 240 wrote to memory of 1688 240 iexplore.exe 47 PID 240 wrote to memory of 1688 240 iexplore.exe 47 PID 704 wrote to memory of 1968 704 zzz.exe 52 PID 704 wrote to memory of 1968 704 zzz.exe 52 PID 704 wrote to memory of 1968 704 zzz.exe 52 PID 704 wrote to memory of 1968 704 zzz.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\avtzap.bat" "2⤵
- Drops startup file
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\zzz.exe"C:\Users\Admin\AppData\Local\Temp\zzz.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\TEMP\sait.VBS"3⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\TEMP\sait.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://openff.sytes.net/5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:856
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\TEMP\readmee.txt5⤵
- Opens file in notepad (likely ransom note)
PID:696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\TEMP\sait.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://openff.sytes.net/5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1208 CREDAT:275457 /prefetch:26⤵
- Suspicious use of SetWindowsHookEx
PID:436
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\TEMP\readmee.txt5⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\TEMP\sait.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://openff.sytes.net/5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:240 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:240 CREDAT:472068 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:240 CREDAT:3486728 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:240 CREDAT:209941 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:240 CREDAT:1192976 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\TEMP\readmee.txt5⤵
- Opens file in notepad (likely ransom note)
PID:1012
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1b81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zzz.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zzz.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\TEMP\sait.VBS"2⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\TEMP\sait.bat" "3⤵PID:1648
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\TEMP\readmee.txt4⤵
- Opens file in notepad (likely ransom note)
PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\TEMP\sait.bat" "3⤵PID:2200
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\TEMP\readmee.txt4⤵
- Opens file in notepad (likely ransom note)
PID:2252
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\TEMP\sait.bat" "3⤵PID:2356
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\TEMP\readmee.txt4⤵
- Opens file in notepad (likely ransom note)
PID:2412
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\TEMP\sait.bat" "3⤵PID:2512
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\TEMP\readmee.txt4⤵
- Opens file in notepad (likely ransom note)
PID:2560
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53cf268847ff191b38301b7ba494a9e9e
SHA1b43e62f74ca751e589dfe3cbad95c5cf6dc40412
SHA256e8185df72b73f746eab586b1cfd28fa2c9aa2c87e2e763579213aa39b402ceb6
SHA5122279151d5938dffb97d6d9d520a4a25301c98828aa6eb66949a6898ccd1652b033a1eedb940ea9d5b5895986cd48a399f9bc0d0c003aaf46cef41279aba0c8f5
-
Filesize
41KB
MD5c4033520521cba801391480c11693390
SHA1ed72adab6fe63ff888be022899455d471ce73318
SHA2561b0d802605c8526efff650bfad7e25bccd5235128463ffe7ab174d21ee830202
SHA5125de22b59da8e170f009e88e12d03090bc090ff7b402d432adc2fd3aa87c83e5e58423c4682631be87a1d950061d80f3ba8f1a8d2141e91087b76ff5f95dfd7a0
-
Filesize
59B
MD5e64113f4aea4af810e0ae0cf058d76c1
SHA1a4f103754b39ffd38a0d2e4f11699ff5e25de721
SHA256b39e17b6e906c3923a037b9c69e4acbaf23a879f01147d23302e19c05ee94b4a
SHA512be25307634106d92442455aa604e2bc89bca5d483ab947c7457bd1918eff3d359a4b61833dfb1e0bff1a8a74fee0de2d9b024e32711078d1c7a9806891ce91ef
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6AE431E1-EBC4-11EC-A33B-DE95627D9645}.dat
Filesize5KB
MD5fea854706f656319959ccca2924a1b74
SHA19411e0108d383b5bd45936dff441bc6fc2d96dd1
SHA256f8585fdbdfe533b4b573027a202866826c9f3ee73570d74fba9cd10706539356
SHA51287617be45769f3d961bd119babfad96f3941ffb494955c8abbfd45f8357943130f9acd9269ab77ed08e23edfdc527c53e9d30f9aafb6536624c6bbd0a17d7edd
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{74E63720-BC2F-11EC-93B8-F2122C6314CC}.dat
Filesize5KB
MD5d761593a0eaa26a2f852ea975c24ac4e
SHA149bff74ae5c7547b4a0903c7a500fdd82cac07b0
SHA25636f89dc9d801ba33a37534cb1bdf8913bd6133b8d8209c39bebf332ead75f6f4
SHA512bd6c73911635f73dcf67f7f30dfc8fb7b2f33a4b87a77b0f4adef94a6031fd6b99ccc6c899266914c066f8c37505167fa9e9bfef68e6b1949877c745cd6f9c36
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{95C1ACD0-EBC4-11EC-A33B-DE95627D9645}.dat
Filesize4KB
MD5a56127707fee1a23b87078874708ff76
SHA15ce56de25dc3ce530f9aabaa09d654e4f17d521a
SHA2563bc80262acd43e75d9f19f6ad1b6b4dfc94e44fb666a7f50d244e78ded1bed28
SHA5120979087fc3da77ff5be3526ee432599ce3c6a23e28a6997a1f19efcfef8acad7c60bee535fa8a9c64d60c9672fcc89e12b78c76b775aaa8f125e15c4568ade8b
-
Filesize
98B
MD5138e66bda2b8088226002ac13ceb7d7a
SHA11ed9e1b1658d8d41c0933aa1e0ba5d566577ff8a
SHA2565cba178a4165b1bc977be7c94a9f70555305a049a7fee3c3ca883530e7e8a302
SHA512d831da3e5759127a2a823a5ddf26d62bc3a2c801f25105a22653acc67ba45a469514928648143599fff780c3ac5e32aee91f24460982153d595768b07b6e7c75
-
Filesize
295KB
MD58b2d6697c9056128cabfb8f6c3207602
SHA12ed8110f2c15a453982b3953ece44555919e123e
SHA256a61deb915fad30c8c34dc1bbf895f72376adf24d0711115ece52f675fd10b045
SHA51280a498763ea04dbb275e177a2f9330d49f63dde3b609fbd469f440a36235747cf932cf92c790fb511980a543807b2178b30bc0c61cae87552bf53d96634a2d11
-
Filesize
295KB
MD58b2d6697c9056128cabfb8f6c3207602
SHA12ed8110f2c15a453982b3953ece44555919e123e
SHA256a61deb915fad30c8c34dc1bbf895f72376adf24d0711115ece52f675fd10b045
SHA51280a498763ea04dbb275e177a2f9330d49f63dde3b609fbd469f440a36235747cf932cf92c790fb511980a543807b2178b30bc0c61cae87552bf53d96634a2d11
-
Filesize
600B
MD59f79e6d66c4a36228151c75b684b6c59
SHA1a05119c0f9b5edb2aa4e04aef6f0c940a7f228fc
SHA25645305b7eea91a488574c6e295f4830895ad0177c183ab856bd9d79df81907e8a
SHA512bf46e66f3062a217d7e0ddfcda9abb425849b1c145585b6c72119f7ca4c3646dca88e09955d9fd60e7eae1bf6edc5a3908f05e1cfe2edc3e896c1b596967aa30
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize4KB
MD518bdf821f8d4d9a04b437d7f167ddb1c
SHA1f71f91b6ae54f97d3d7c3a1fbfe160b7769c7d4d
SHA256b18ab3ceadb2bf0e1481648011085d7f1167ab66b8ffd6b195b32f217c05915f
SHA512bdb8031b77a91ca5470e19257e2d4ff3148d2f840296f95a5692c57a54e108158057e5dd59af5612ab857d042e61b6397e39c54ec402bc1ce53a93cb553fbfa9
-
Filesize
295KB
MD58b2d6697c9056128cabfb8f6c3207602
SHA12ed8110f2c15a453982b3953ece44555919e123e
SHA256a61deb915fad30c8c34dc1bbf895f72376adf24d0711115ece52f675fd10b045
SHA51280a498763ea04dbb275e177a2f9330d49f63dde3b609fbd469f440a36235747cf932cf92c790fb511980a543807b2178b30bc0c61cae87552bf53d96634a2d11
-
Filesize
295KB
MD58b2d6697c9056128cabfb8f6c3207602
SHA12ed8110f2c15a453982b3953ece44555919e123e
SHA256a61deb915fad30c8c34dc1bbf895f72376adf24d0711115ece52f675fd10b045
SHA51280a498763ea04dbb275e177a2f9330d49f63dde3b609fbd469f440a36235747cf932cf92c790fb511980a543807b2178b30bc0c61cae87552bf53d96634a2d11
-
Filesize
295KB
MD58b2d6697c9056128cabfb8f6c3207602
SHA12ed8110f2c15a453982b3953ece44555919e123e
SHA256a61deb915fad30c8c34dc1bbf895f72376adf24d0711115ece52f675fd10b045
SHA51280a498763ea04dbb275e177a2f9330d49f63dde3b609fbd469f440a36235747cf932cf92c790fb511980a543807b2178b30bc0c61cae87552bf53d96634a2d11
-
Filesize
295KB
MD58b2d6697c9056128cabfb8f6c3207602
SHA12ed8110f2c15a453982b3953ece44555919e123e
SHA256a61deb915fad30c8c34dc1bbf895f72376adf24d0711115ece52f675fd10b045
SHA51280a498763ea04dbb275e177a2f9330d49f63dde3b609fbd469f440a36235747cf932cf92c790fb511980a543807b2178b30bc0c61cae87552bf53d96634a2d11
-
Filesize
295KB
MD58b2d6697c9056128cabfb8f6c3207602
SHA12ed8110f2c15a453982b3953ece44555919e123e
SHA256a61deb915fad30c8c34dc1bbf895f72376adf24d0711115ece52f675fd10b045
SHA51280a498763ea04dbb275e177a2f9330d49f63dde3b609fbd469f440a36235747cf932cf92c790fb511980a543807b2178b30bc0c61cae87552bf53d96634a2d11