Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19/06/2022, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe
Resource
win10v2004-20220414-en
General
-
Target
34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe
-
Size
344KB
-
MD5
09824e2affd2a72f2dd030ed4e7dae15
-
SHA1
33a6b92cd5dce872e24723372d4e49396ea7fd1b
-
SHA256
34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26
-
SHA512
e0439baf443011822d7ae70fee70cc95746521d7d66980a6e805704eeb54255bcd0e00b0ba041ef65d4aed0a60bf3eaaeabc2528903c8793b1ca43b39fdc8f0b
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\Recovery+xrwbd.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5F2F9F54B415CD26
http://tes543berda73i48fsdfsd.keratadze.at/5F2F9F54B415CD26
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/5F2F9F54B415CD26
http://xlowfznrg4wf7dli.ONION/5F2F9F54B415CD26
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 528 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation pmeecpvkxovp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run pmeecpvkxovp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vpkuhyqcihrw = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\pmeecpvkxovp.exe\"" pmeecpvkxovp.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4620 set thread context of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 528 set thread context of 260 528 pmeecpvkxovp.exe 91 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-36.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailBadge.scale-400.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\OrientationControlMiddleCircle.png pmeecpvkxovp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\Recovery+xrwbd.txt pmeecpvkxovp.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\Recovery+xrwbd.html pmeecpvkxovp.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_48.jpg pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNotebookWideTile.scale-400.png pmeecpvkxovp.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\27.jpg pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\Recovery+xrwbd.html pmeecpvkxovp.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\Recovery+xrwbd.txt pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\WideLogo.scale-125_contrast-white.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Yahoo-Dark.scale-400.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\LockScreenLogo.scale-150.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-36_altform-colorize.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-72_altform-unplated.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-40_altform-lightunplated.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x86__8wekyb3d8bbwe\microsoft.system.package.metadata\Recovery+xrwbd.html pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\images\PaySquare44x44Logo.scale-200.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_targetsize-40_altform-unplated.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailWideTile.scale-200.png pmeecpvkxovp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\Recovery+xrwbd.html pmeecpvkxovp.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPack2019Eula.txt pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\AppPackageSplashScreen.scale-125_contrast-black.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\Recovery+xrwbd.html pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarWideTile.scale-200.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\ExchangeLargeTile.scale-400.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-16_altform-unplated_contrast-black.png pmeecpvkxovp.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\Recovery+xrwbd.html pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\SmallTile.scale-200_contrast-white.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-40_altform-lightunplated.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ar-SA\View3d\Recovery+xrwbd.txt pmeecpvkxovp.exe File opened for modification C:\Program Files\Windows NT\TableTextService\en-US\Recovery+xrwbd.txt pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\7px.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_~_kzf8qxf38zg5c\microsoft.system.package.metadata\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-60_altform-unplated.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\iheart-radio.scale-200_contrast-white.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-96_altform-unplated_contrast-black.png pmeecpvkxovp.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\Recovery+xrwbd.txt pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Fonts\Recovery+xrwbd.html pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNotePageSmallTile.scale-100.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\AppxMetadata\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Views\Utilities\Styling\css\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-256.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-36_altform-unplated_contrast-black.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreMedTile.scale-100.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageLargeTile.scale-125.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-256_altform-unplated.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\ScreenSketchSquare150x150Logo.scale-100_contrast-black.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\fonts\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\WinMetadata\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\Recovery+xrwbd.txt pmeecpvkxovp.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteSmallTile.scale-400.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-36_contrast-black.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\Movie-TVStoreLogo.scale-200_contrast-black.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\Recovery+xrwbd.txt pmeecpvkxovp.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\Recovery+xrwbd.png pmeecpvkxovp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-180.png pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleAppAssets\Videos\people_fre_motionAsset_p3.mp4 pmeecpvkxovp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Services.Store.Engagement_10.0.18101.0_x86__8wekyb3d8bbwe\AppxMetadata\Recovery+xrwbd.html pmeecpvkxovp.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\pmeecpvkxovp.exe 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe File opened for modification C:\Windows\pmeecpvkxovp.exe 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe 260 pmeecpvkxovp.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 4120 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe Token: SeDebugPrivilege 260 pmeecpvkxovp.exe Token: SeIncreaseQuotaPrivilege 4860 WMIC.exe Token: SeSecurityPrivilege 4860 WMIC.exe Token: SeTakeOwnershipPrivilege 4860 WMIC.exe Token: SeLoadDriverPrivilege 4860 WMIC.exe Token: SeSystemProfilePrivilege 4860 WMIC.exe Token: SeSystemtimePrivilege 4860 WMIC.exe Token: SeProfSingleProcessPrivilege 4860 WMIC.exe Token: SeIncBasePriorityPrivilege 4860 WMIC.exe Token: SeCreatePagefilePrivilege 4860 WMIC.exe Token: SeBackupPrivilege 4860 WMIC.exe Token: SeRestorePrivilege 4860 WMIC.exe Token: SeShutdownPrivilege 4860 WMIC.exe Token: SeDebugPrivilege 4860 WMIC.exe Token: SeSystemEnvironmentPrivilege 4860 WMIC.exe Token: SeRemoteShutdownPrivilege 4860 WMIC.exe Token: SeUndockPrivilege 4860 WMIC.exe Token: SeManageVolumePrivilege 4860 WMIC.exe Token: 33 4860 WMIC.exe Token: 34 4860 WMIC.exe Token: 35 4860 WMIC.exe Token: 36 4860 WMIC.exe Token: SeIncreaseQuotaPrivilege 4860 WMIC.exe Token: SeSecurityPrivilege 4860 WMIC.exe Token: SeTakeOwnershipPrivilege 4860 WMIC.exe Token: SeLoadDriverPrivilege 4860 WMIC.exe Token: SeSystemProfilePrivilege 4860 WMIC.exe Token: SeSystemtimePrivilege 4860 WMIC.exe Token: SeProfSingleProcessPrivilege 4860 WMIC.exe Token: SeIncBasePriorityPrivilege 4860 WMIC.exe Token: SeCreatePagefilePrivilege 4860 WMIC.exe Token: SeBackupPrivilege 4860 WMIC.exe Token: SeRestorePrivilege 4860 WMIC.exe Token: SeShutdownPrivilege 4860 WMIC.exe Token: SeDebugPrivilege 4860 WMIC.exe Token: SeSystemEnvironmentPrivilege 4860 WMIC.exe Token: SeRemoteShutdownPrivilege 4860 WMIC.exe Token: SeUndockPrivilege 4860 WMIC.exe Token: SeManageVolumePrivilege 4860 WMIC.exe Token: 33 4860 WMIC.exe Token: 34 4860 WMIC.exe Token: 35 4860 WMIC.exe Token: 36 4860 WMIC.exe Token: SeBackupPrivilege 4060 vssvc.exe Token: SeRestorePrivilege 4060 vssvc.exe Token: SeAuditPrivilege 4060 vssvc.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4620 wrote to memory of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 4620 wrote to memory of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 4620 wrote to memory of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 4620 wrote to memory of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 4620 wrote to memory of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 4620 wrote to memory of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 4620 wrote to memory of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 4620 wrote to memory of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 4620 wrote to memory of 4120 4620 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 87 PID 4120 wrote to memory of 528 4120 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 88 PID 4120 wrote to memory of 528 4120 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 88 PID 4120 wrote to memory of 528 4120 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 88 PID 4120 wrote to memory of 2288 4120 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 89 PID 4120 wrote to memory of 2288 4120 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 89 PID 4120 wrote to memory of 2288 4120 34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe 89 PID 528 wrote to memory of 260 528 pmeecpvkxovp.exe 91 PID 528 wrote to memory of 260 528 pmeecpvkxovp.exe 91 PID 528 wrote to memory of 260 528 pmeecpvkxovp.exe 91 PID 528 wrote to memory of 260 528 pmeecpvkxovp.exe 91 PID 528 wrote to memory of 260 528 pmeecpvkxovp.exe 91 PID 528 wrote to memory of 260 528 pmeecpvkxovp.exe 91 PID 528 wrote to memory of 260 528 pmeecpvkxovp.exe 91 PID 528 wrote to memory of 260 528 pmeecpvkxovp.exe 91 PID 528 wrote to memory of 260 528 pmeecpvkxovp.exe 91 PID 260 wrote to memory of 4860 260 pmeecpvkxovp.exe 92 PID 260 wrote to memory of 4860 260 pmeecpvkxovp.exe 92 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pmeecpvkxovp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" pmeecpvkxovp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe"C:\Users\Admin\AppData\Local\Temp\34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe"C:\Users\Admin\AppData\Local\Temp\34eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\pmeecpvkxovp.exeC:\Windows\pmeecpvkxovp.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\pmeecpvkxovp.exeC:\Windows\pmeecpvkxovp.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:260 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\34EB8F~1.EXE3⤵PID:2288
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD509824e2affd2a72f2dd030ed4e7dae15
SHA133a6b92cd5dce872e24723372d4e49396ea7fd1b
SHA25634eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26
SHA512e0439baf443011822d7ae70fee70cc95746521d7d66980a6e805704eeb54255bcd0e00b0ba041ef65d4aed0a60bf3eaaeabc2528903c8793b1ca43b39fdc8f0b
-
Filesize
344KB
MD509824e2affd2a72f2dd030ed4e7dae15
SHA133a6b92cd5dce872e24723372d4e49396ea7fd1b
SHA25634eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26
SHA512e0439baf443011822d7ae70fee70cc95746521d7d66980a6e805704eeb54255bcd0e00b0ba041ef65d4aed0a60bf3eaaeabc2528903c8793b1ca43b39fdc8f0b
-
Filesize
344KB
MD509824e2affd2a72f2dd030ed4e7dae15
SHA133a6b92cd5dce872e24723372d4e49396ea7fd1b
SHA25634eb8f0b11959038ac6728734e6c4bb66ee45487ec4487e066850b0e4279ab26
SHA512e0439baf443011822d7ae70fee70cc95746521d7d66980a6e805704eeb54255bcd0e00b0ba041ef65d4aed0a60bf3eaaeabc2528903c8793b1ca43b39fdc8f0b