Analysis
-
max time kernel
151s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-06-2022 15:08
Static task
static1
Behavioral task
behavioral1
Sample
293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe
Resource
win10v2004-20220414-en
General
-
Target
293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe
-
Size
372KB
-
MD5
69a333f36443f4e490e81a021aa7148b
-
SHA1
6261856cfc12e38b9b042bf18bba88066e036112
-
SHA256
293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd
-
SHA512
62e010ae830faa99b263aa2cd9932d3f1ef309d9bdef77248a8d0d6574b814f67f489af9f83db33263dafb4054d5ea08bbe49b482b0522200baba28f1a2704b7
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\Recovery+lmltp.txt
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/66E5E6E43B3C3CD0
http://b4youfred5485jgsa3453f.italazudda.com/66E5E6E43B3C3CD0
http://5rport45vcdef345adfkksawe.bematvocal.at/66E5E6E43B3C3CD0
http://fwgrhsao3aoml7ej.onion/66E5E6E43B3C3CD0
http://fwgrhsao3aoml7ej.ONION/66E5E6E43B3C3CD0
Signatures
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
qspaxnogcbpg.exeqspaxnogcbpg.exepid process 984 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1864 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
qspaxnogcbpg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run qspaxnogcbpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\rlftjfcctotc = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\qspaxnogcbpg.exe\"" qspaxnogcbpg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exeqspaxnogcbpg.exedescription pid process target process PID 1668 set thread context of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 984 set thread context of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
qspaxnogcbpg.exedescription ioc process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\Recovery+lmltp.html qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\Recovery+lmltp.html qspaxnogcbpg.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-highlight.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\whitemask1047.png qspaxnogcbpg.exe File opened for modification C:\Program Files\GetDebug.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\1047x576black.png qspaxnogcbpg.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_ButtonGraphic.png qspaxnogcbpg.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\Recovery+lmltp.html qspaxnogcbpg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pl.pak qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720x480icongraphic.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\Recovery+lmltp.html qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\Recovery+lmltp.html qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-static.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\en-GB.pak qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\System\msadc\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_ButtonGraphic.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_videoinset.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\content-background.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\Recovery+lmltp.html qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\it-IT\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_SelectionSubpicture.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_SelectionSubpicture.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-image-mask.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_rgb.wmv qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\reflect.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_SelectionSubpicture.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Perf_Scenes_Mask1.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\Recovery+lmltp.html qspaxnogcbpg.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\tr.pak qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\Recovery+lmltp.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\Recovery+lmltp.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\1047x576_91n92.png qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_SelectionSubpicture.png qspaxnogcbpg.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\Recovery+lmltp.html qspaxnogcbpg.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\720x480icongraphic.png qspaxnogcbpg.exe -
Drops file in Windows directory 2 IoCs
Processes:
293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exedescription ioc process File opened for modification C:\Windows\qspaxnogcbpg.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe File created C:\Windows\qspaxnogcbpg.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
qspaxnogcbpg.exepid process 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe 1164 qspaxnogcbpg.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exeqspaxnogcbpg.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1156 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe Token: SeDebugPrivilege 1164 qspaxnogcbpg.exe Token: SeIncreaseQuotaPrivilege 1968 WMIC.exe Token: SeSecurityPrivilege 1968 WMIC.exe Token: SeTakeOwnershipPrivilege 1968 WMIC.exe Token: SeLoadDriverPrivilege 1968 WMIC.exe Token: SeSystemProfilePrivilege 1968 WMIC.exe Token: SeSystemtimePrivilege 1968 WMIC.exe Token: SeProfSingleProcessPrivilege 1968 WMIC.exe Token: SeIncBasePriorityPrivilege 1968 WMIC.exe Token: SeCreatePagefilePrivilege 1968 WMIC.exe Token: SeBackupPrivilege 1968 WMIC.exe Token: SeRestorePrivilege 1968 WMIC.exe Token: SeShutdownPrivilege 1968 WMIC.exe Token: SeDebugPrivilege 1968 WMIC.exe Token: SeSystemEnvironmentPrivilege 1968 WMIC.exe Token: SeRemoteShutdownPrivilege 1968 WMIC.exe Token: SeUndockPrivilege 1968 WMIC.exe Token: SeManageVolumePrivilege 1968 WMIC.exe Token: 33 1968 WMIC.exe Token: 34 1968 WMIC.exe Token: 35 1968 WMIC.exe Token: SeIncreaseQuotaPrivilege 1968 WMIC.exe Token: SeSecurityPrivilege 1968 WMIC.exe Token: SeTakeOwnershipPrivilege 1968 WMIC.exe Token: SeLoadDriverPrivilege 1968 WMIC.exe Token: SeSystemProfilePrivilege 1968 WMIC.exe Token: SeSystemtimePrivilege 1968 WMIC.exe Token: SeProfSingleProcessPrivilege 1968 WMIC.exe Token: SeIncBasePriorityPrivilege 1968 WMIC.exe Token: SeCreatePagefilePrivilege 1968 WMIC.exe Token: SeBackupPrivilege 1968 WMIC.exe Token: SeRestorePrivilege 1968 WMIC.exe Token: SeShutdownPrivilege 1968 WMIC.exe Token: SeDebugPrivilege 1968 WMIC.exe Token: SeSystemEnvironmentPrivilege 1968 WMIC.exe Token: SeRemoteShutdownPrivilege 1968 WMIC.exe Token: SeUndockPrivilege 1968 WMIC.exe Token: SeManageVolumePrivilege 1968 WMIC.exe Token: 33 1968 WMIC.exe Token: 34 1968 WMIC.exe Token: 35 1968 WMIC.exe Token: SeBackupPrivilege 1100 vssvc.exe Token: SeRestorePrivilege 1100 vssvc.exe Token: SeAuditPrivilege 1100 vssvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exeqspaxnogcbpg.exepid process 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 984 qspaxnogcbpg.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exeqspaxnogcbpg.exeqspaxnogcbpg.exedescription pid process target process PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1668 wrote to memory of 1156 1668 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe PID 1156 wrote to memory of 984 1156 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe qspaxnogcbpg.exe PID 1156 wrote to memory of 984 1156 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe qspaxnogcbpg.exe PID 1156 wrote to memory of 984 1156 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe qspaxnogcbpg.exe PID 1156 wrote to memory of 984 1156 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe qspaxnogcbpg.exe PID 1156 wrote to memory of 1864 1156 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe cmd.exe PID 1156 wrote to memory of 1864 1156 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe cmd.exe PID 1156 wrote to memory of 1864 1156 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe cmd.exe PID 1156 wrote to memory of 1864 1156 293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe cmd.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 984 wrote to memory of 1164 984 qspaxnogcbpg.exe qspaxnogcbpg.exe PID 1164 wrote to memory of 1968 1164 qspaxnogcbpg.exe WMIC.exe PID 1164 wrote to memory of 1968 1164 qspaxnogcbpg.exe WMIC.exe PID 1164 wrote to memory of 1968 1164 qspaxnogcbpg.exe WMIC.exe PID 1164 wrote to memory of 1968 1164 qspaxnogcbpg.exe WMIC.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
qspaxnogcbpg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System qspaxnogcbpg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" qspaxnogcbpg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe"C:\Users\Admin\AppData\Local\Temp\293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe"C:\Users\Admin\AppData\Local\Temp\293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\qspaxnogcbpg.exeC:\Windows\qspaxnogcbpg.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\qspaxnogcbpg.exeC:\Windows\qspaxnogcbpg.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1164 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\293317~1.EXE3⤵
- Deletes itself
PID:1864
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD569a333f36443f4e490e81a021aa7148b
SHA16261856cfc12e38b9b042bf18bba88066e036112
SHA256293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd
SHA51262e010ae830faa99b263aa2cd9932d3f1ef309d9bdef77248a8d0d6574b814f67f489af9f83db33263dafb4054d5ea08bbe49b482b0522200baba28f1a2704b7
-
Filesize
372KB
MD569a333f36443f4e490e81a021aa7148b
SHA16261856cfc12e38b9b042bf18bba88066e036112
SHA256293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd
SHA51262e010ae830faa99b263aa2cd9932d3f1ef309d9bdef77248a8d0d6574b814f67f489af9f83db33263dafb4054d5ea08bbe49b482b0522200baba28f1a2704b7
-
Filesize
372KB
MD569a333f36443f4e490e81a021aa7148b
SHA16261856cfc12e38b9b042bf18bba88066e036112
SHA256293317443192a9f2ce574febe990fad9ed399c760a350433020b06440dc92cfd
SHA51262e010ae830faa99b263aa2cd9932d3f1ef309d9bdef77248a8d0d6574b814f67f489af9f83db33263dafb4054d5ea08bbe49b482b0522200baba28f1a2704b7