Analysis
-
max time kernel
152s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-06-2022 06:43
Static task
static1
Behavioral task
behavioral1
Sample
26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe
Resource
win10v2004-20220414-en
General
-
Target
26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe
-
Size
238KB
-
MD5
c2cd821ccd6eec05ec67be3a99ba0f71
-
SHA1
916e018fe28774ef227e839b98dc0a85c13d64a3
-
SHA256
26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14
-
SHA512
8fbe6edcd6c58ec34815e5ba422cf335445a50a958de5758bcefa29fc9179a7fe9c31fb7f5d5c5f310304709496e7e64f539a25d907a349c1e15bf8861f3d548
Malware Config
Extracted
C:\Users\Admin\Desktop\!HELP_SOS.hta
http://7gie6ffnkrjykggd.op7su2.com/
http://7gie6ffnkrjykggd.pe6zawc.com/
http://7gie6ffnkrjykggd.onion/login/AWLuRCaH58mvPpXSIPixiup5_ED1jMVx4gEe7OjDjRNUZeyP91SCU2LA
http://7gie6ffnkrjykggd.onion/login/AWLuRCaH58mvPpXSIPixiup5_ED1jMVx4gEe7OjDjRNUZeyP91SCU2LA到浏览器的地址栏,然后按下"回车"键;
Signatures
-
Contacts a large (7719) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 4592 srpj9hP6.exe 4680 srpj9hP6.exe -
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\UnprotectInstall.png... srpj9hP6.exe File renamed C:\Users\Admin\Pictures\UnprotectInstall.png... => C:\Users\Admin\Pictures\UnprotectInstall.png.sage srpj9hP6.exe File opened for modification C:\Users\Admin\Pictures\StartUnlock.tiff srpj9hP6.exe File created C:\Users\Admin\Pictures\StartUnlock.tiff... srpj9hP6.exe File created C:\Users\Admin\Pictures\EnterMeasure.raw... srpj9hP6.exe File renamed C:\Users\Admin\Pictures\StartUnlock.tiff... => C:\Users\Admin\Pictures\StartUnlock.tiff.sage srpj9hP6.exe File renamed C:\Users\Admin\Pictures\EnterMeasure.raw... => C:\Users\Admin\Pictures\EnterMeasure.raw.sage srpj9hP6.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation srpj9hP6.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\Desktop\Wallpaper srpj9hP6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tJZ.bmp" srpj9hP6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1128 schtasks.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\Desktop srpj9hP6.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30966121" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30966121" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30966121" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "362139053" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2A9D7E78-ED5C-11EC-B274-6A1EA45F0745} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "247435369" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30966121" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "9621109" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "9621109" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "139934225" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "139934225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30966121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff720000001a000000f80400007f020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-19 srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-20 srpj9hP6.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\sage.notice srpj9hP6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\sage.notice\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,47" srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\sage.notice\shell srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\sage.notice\shell\open srpj9hP6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\.sage\ = "sage.notice" srpj9hP6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\sage.notice\shell\open\command\ = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\f1.hta\" \"%1\"" srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\sage.notice\shell\open\command srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\sage.notice\FriendlyTypeName srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\htafile\DefaultIcon srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\htafile srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\sage.notice\DefaultIcon srpj9hP6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\sage.notice\FriendlyTypeName\ = "encrypted by SAGE" srpj9hP6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\htafile\DefaultIcon\ = "%WinDir%\\SysWow64\\shell32.dll,44" srpj9hP6.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\.sage srpj9hP6.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1284 PING.EXE 2140 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe 4592 srpj9hP6.exe -
Suspicious behavior: LoadsDriver 50 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 668 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe Token: 33 5036 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5036 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 4940 iexplore.exe 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 4940 iexplore.exe 1572 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 4940 iexplore.exe 4592 srpj9hP6.exe 4940 iexplore.exe 4680 srpj9hP6.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4940 iexplore.exe 4940 iexplore.exe 4988 IEXPLORE.EXE 4988 IEXPLORE.EXE 4940 iexplore.exe 4940 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 4940 iexplore.exe 4940 iexplore.exe 3384 IEXPLORE.EXE 3384 IEXPLORE.EXE 4940 iexplore.exe 4940 iexplore.exe 3472 IEXPLORE.EXE 3472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4988 4940 iexplore.exe 83 PID 4940 wrote to memory of 4988 4940 iexplore.exe 83 PID 4940 wrote to memory of 4988 4940 iexplore.exe 83 PID 1576 wrote to memory of 1572 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 90 PID 1576 wrote to memory of 1572 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 90 PID 1576 wrote to memory of 1572 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 90 PID 4940 wrote to memory of 2440 4940 iexplore.exe 91 PID 4940 wrote to memory of 2440 4940 iexplore.exe 91 PID 4940 wrote to memory of 2440 4940 iexplore.exe 91 PID 1576 wrote to memory of 1128 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 92 PID 1576 wrote to memory of 1128 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 92 PID 1576 wrote to memory of 1128 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 92 PID 1576 wrote to memory of 4592 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 97 PID 1576 wrote to memory of 4592 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 97 PID 1576 wrote to memory of 4592 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 97 PID 4940 wrote to memory of 3384 4940 iexplore.exe 98 PID 4940 wrote to memory of 3384 4940 iexplore.exe 98 PID 4940 wrote to memory of 3384 4940 iexplore.exe 98 PID 1576 wrote to memory of 4412 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 99 PID 1576 wrote to memory of 4412 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 99 PID 1576 wrote to memory of 4412 1576 26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe 99 PID 4412 wrote to memory of 1284 4412 cmd.exe 101 PID 4412 wrote to memory of 1284 4412 cmd.exe 101 PID 4412 wrote to memory of 1284 4412 cmd.exe 101 PID 4592 wrote to memory of 4680 4592 srpj9hP6.exe 105 PID 4592 wrote to memory of 4680 4592 srpj9hP6.exe 105 PID 4592 wrote to memory of 4680 4592 srpj9hP6.exe 105 PID 4940 wrote to memory of 3472 4940 iexplore.exe 106 PID 4940 wrote to memory of 3472 4940 iexplore.exe 106 PID 4940 wrote to memory of 3472 4940 iexplore.exe 106 PID 4592 wrote to memory of 448 4592 srpj9hP6.exe 121 PID 4592 wrote to memory of 448 4592 srpj9hP6.exe 121 PID 4592 wrote to memory of 448 4592 srpj9hP6.exe 121 PID 4592 wrote to memory of 460 4592 srpj9hP6.exe 122 PID 4592 wrote to memory of 460 4592 srpj9hP6.exe 122 PID 4592 wrote to memory of 460 4592 srpj9hP6.exe 122 PID 4592 wrote to memory of 1012 4592 srpj9hP6.exe 123 PID 4592 wrote to memory of 1012 4592 srpj9hP6.exe 123 PID 4592 wrote to memory of 1012 4592 srpj9hP6.exe 123 PID 4592 wrote to memory of 4472 4592 srpj9hP6.exe 125 PID 4592 wrote to memory of 4472 4592 srpj9hP6.exe 125 PID 4592 wrote to memory of 4472 4592 srpj9hP6.exe 125 PID 4472 wrote to memory of 2140 4472 cmd.exe 127 PID 4472 wrote to memory of 2140 4472 cmd.exe 127 PID 4472 wrote to memory of 2140 4472 cmd.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe"C:\Users\Admin\AppData\Local\Temp\26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe"C:\Users\Admin\AppData\Local\Temp\26f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14.exe" g2⤵
- Suspicious use of FindShellTrayWindow
PID:1572
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "HP43icp3" /TR "C:\Users\Admin\AppData\Roaming\srpj9hP6.exe" /SC ONLOGON /RL HIGHEST /F2⤵
- Creates scheduled task(s)
PID:1128
-
-
C:\Users\Admin\AppData\Roaming\srpj9hP6.exe"C:\Users\Admin\AppData\Roaming\srpj9hP6.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Roaming\srpj9hP6.exe"C:\Users\Admin\AppData\Roaming\srpj9hP6.exe" g3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4680
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\!HELP_SOS.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:448
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f1.vbs"3⤵PID:460
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /DELETE /TN /F "HP43icp3"3⤵PID:1012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config16184093.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2140
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\__config252888.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:1284
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2184
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4940 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4988
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4940 CREDAT:82948 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4940 CREDAT:17414 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3384
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4940 CREDAT:17418 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3472
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:5036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5110ea891292e3a11e4a543d479aa8d1d
SHA1e91bed98bf77cdc79f34570f1ea63a27b496530a
SHA256276a18fa66a2c9da84311017ebcab55cc58b4bcce4fc1079906389852846be16
SHA51244e9ba2d667513512efa5e0641b70be8d94b933f72992b31bf207a0b845956d8e2830d0d47b8a5d0508771fd61a32bdcc3e8124cbc920eb4772548ab45a4674c
-
Filesize
2KB
MD56d9a00e82a3834103bf137ff70b19684
SHA1a2c1eaed45e3660ade4165bc59a9f38037eef486
SHA256fa0668b7bd415b73312ab9a4bfc07ed9cb54d32aae651d90cbc72e2bd40e881d
SHA51294574dcd206056c8d3839105f24b46f226201b052222c9cc371d559b735ba1aea4ddf99b409d8dee496b276be7d5d51988432c884f148f8dcff6e0eaef22930e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5253626de057b0d04c41cb8a08245fcbe
SHA1ffcb46236625dc17807021f8fe706efda9970958
SHA25675b3965bbb50f8e182b84896c7496cc36b3710b95bf607734a2dae8c40588989
SHA5126bab75dea365fe30bc00ac7d53db9d9876929ad2f7576d9090fdd5a3950f2e98b46edd573f3c5c8ab2ccaaab9c4c2e36cc515fa6419b7931a4a9e8b2b44e3113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD53895372ed18d1913aea2ecac859b0ce1
SHA195797a31fb0087d5f48c2541ef5ba835b7200ff0
SHA256c86a944b7c54e5b7d04bb5d2f648ec002aec36b1ea700696ccde5d04b2625185
SHA5128a823b66343576617f5169f819e7ac661d55cb6c393997df04f15aa50207844960c33a836ab0eef0f121a43ce7445cf78ba1de550876caa30493d7f9e279a7ce
-
Filesize
218B
MD58f267b238307c7860f37fdeaefdc3548
SHA10bf6a0515796ad3b138feceb24a4e9ff48aed406
SHA256b1b856fb63f66e36a25604223ad3aff171631ee0a052b3f926a4085fa17efb1f
SHA512fe68232f5949909090505397ccd803f93355bf16c2ad84708bf4ffec90de68fd39630c8ee6a9d40268d3a35ee6219afcbee164f421439afe5f31929af7a850a4
-
Filesize
227B
MD51e8c5838db63b92198de92957ef20172
SHA131609e51b5ddbddedfcc78a9ab8201749b17d18b
SHA256accba60a1555d17f7d990e8e40280c2f344120de968280b212b714edc690561d
SHA51258c3027427749dfb78387f90b88e76c8d8eb3242f43c62cb9aede72f288caafc78126e140a1874a20649fa75523809526d7f2936e4dce53aaf9b9f4527b82bd4
-
Filesize
3KB
MD54c999bbfddd5513d08d2d414c92ac2f4
SHA123e40ea4b75dc037a5cdfce521826737090dce09
SHA2569a55ac3ff3c115b686c19da0a88a9e7525aa62d49c69b107addf8efd33a16215
SHA5127b48cbff08a98f273afb78262167030395fab421718df559625867b91f98fbb0eb0152e8002568428086d1bd3f03f9c9ab26fdabdf9e33ffcea8f5c56529b944
-
Filesize
65B
MD5f152f43111cf087813bd828e6abcb78f
SHA166cb2ba24f02e87d494bfe7c712a94a83561ce28
SHA2565690752969a9abd697876985cc7aac3f13d7521bd91058026f81e504f2e5bdae
SHA512a1d03caa8551145f565736e07882576c81036dc01a4816a0a5319ac63821b41c4e6de3f49e20f463f38aef92b14eb30f49e84f5237dcc3424870d814ab9a1a83
-
Filesize
238KB
MD5c2cd821ccd6eec05ec67be3a99ba0f71
SHA1916e018fe28774ef227e839b98dc0a85c13d64a3
SHA25626f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14
SHA5128fbe6edcd6c58ec34815e5ba422cf335445a50a958de5758bcefa29fc9179a7fe9c31fb7f5d5c5f310304709496e7e64f539a25d907a349c1e15bf8861f3d548
-
Filesize
238KB
MD5c2cd821ccd6eec05ec67be3a99ba0f71
SHA1916e018fe28774ef227e839b98dc0a85c13d64a3
SHA25626f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14
SHA5128fbe6edcd6c58ec34815e5ba422cf335445a50a958de5758bcefa29fc9179a7fe9c31fb7f5d5c5f310304709496e7e64f539a25d907a349c1e15bf8861f3d548
-
Filesize
238KB
MD5c2cd821ccd6eec05ec67be3a99ba0f71
SHA1916e018fe28774ef227e839b98dc0a85c13d64a3
SHA25626f5a4b79ee5a6cc0acacd5d285a10907ff9eb2d32af5bddef3ad81f663a5b14
SHA5128fbe6edcd6c58ec34815e5ba422cf335445a50a958de5758bcefa29fc9179a7fe9c31fb7f5d5c5f310304709496e7e64f539a25d907a349c1e15bf8861f3d548
-
Filesize
52KB
MD53890fc84f1b9c77e570f59fa854fa0ef
SHA1844d7dc91ad1ec3cc5e1eea7537efb670d0a1d1e
SHA2567a7db2d8d81d5622a7a3cc5df8f4c10d6cc6c9c7950bafc3e5b7c66cf34dfb3b
SHA512715f2514b92d319fea178ff80fef180097c989aacf20c8d1125dd1ebb5a3034da3629f39642280349eba75235e768408ae4d3adbc755ffab7bf95a52d13cdf44