Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 22:10
Static task
static1
Behavioral task
behavioral1
Sample
37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe
Resource
win10v2004-20220414-en
General
-
Target
37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe
-
Size
352KB
-
MD5
2a6d24e8860bbd84be02f3062d16a753
-
SHA1
f7d4cf1c34c98c365b6d0db5da54fffc1f6cf70d
-
SHA256
37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1
-
SHA512
602cd0a0d3d3fc7c55a21fc43672e5611044f450e10b13df597504867ef62d58dbef4e1730fdff4c1d0c7bfe6d43503de3827d3f407788e937e886593bd2412b
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECOVERY_+pslmw.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/C0EF202629668CE6
http://tes543berda73i48fsdfsd.keratadze.at/C0EF202629668CE6
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/C0EF202629668CE6
http://xlowfznrg4wf7dli.ONION/C0EF202629668CE6
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
mkxclxlfdenv.exemkxclxlfdenv.exepid Process 980 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1948 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mkxclxlfdenv.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\iwonunewfocw = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\mkxclxlfdenv.exe\"" mkxclxlfdenv.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run mkxclxlfdenv.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exemkxclxlfdenv.exedescription pid Process procid_target PID 1076 set thread context of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 980 set thread context of 1728 980 mkxclxlfdenv.exe 31 -
Drops file in Program Files directory 64 IoCs
Processes:
mkxclxlfdenv.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png mkxclxlfdenv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\LightBlueRectangle.PNG mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi mkxclxlfdenv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\navSubpicture.png mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\DisableRequest.cr2 mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground.wmv mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\_RECOVERY_+pslmw.html mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\7-Zip\_RECOVERY_+pslmw.png mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_RECOVERY_+pslmw.txt mkxclxlfdenv.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\_RECOVERY_+pslmw.png mkxclxlfdenv.exe -
Drops file in Windows directory 2 IoCs
Processes:
37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exedescription ioc Process File created C:\Windows\mkxclxlfdenv.exe 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe File opened for modification C:\Windows\mkxclxlfdenv.exe 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
mkxclxlfdenv.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 mkxclxlfdenv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 mkxclxlfdenv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 mkxclxlfdenv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 mkxclxlfdenv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 mkxclxlfdenv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 mkxclxlfdenv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mkxclxlfdenv.exepid Process 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe 1728 mkxclxlfdenv.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exemkxclxlfdenv.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1928 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe Token: SeDebugPrivilege 1728 mkxclxlfdenv.exe Token: SeIncreaseQuotaPrivilege 520 WMIC.exe Token: SeSecurityPrivilege 520 WMIC.exe Token: SeTakeOwnershipPrivilege 520 WMIC.exe Token: SeLoadDriverPrivilege 520 WMIC.exe Token: SeSystemProfilePrivilege 520 WMIC.exe Token: SeSystemtimePrivilege 520 WMIC.exe Token: SeProfSingleProcessPrivilege 520 WMIC.exe Token: SeIncBasePriorityPrivilege 520 WMIC.exe Token: SeCreatePagefilePrivilege 520 WMIC.exe Token: SeBackupPrivilege 520 WMIC.exe Token: SeRestorePrivilege 520 WMIC.exe Token: SeShutdownPrivilege 520 WMIC.exe Token: SeDebugPrivilege 520 WMIC.exe Token: SeSystemEnvironmentPrivilege 520 WMIC.exe Token: SeRemoteShutdownPrivilege 520 WMIC.exe Token: SeUndockPrivilege 520 WMIC.exe Token: SeManageVolumePrivilege 520 WMIC.exe Token: 33 520 WMIC.exe Token: 34 520 WMIC.exe Token: 35 520 WMIC.exe Token: SeIncreaseQuotaPrivilege 520 WMIC.exe Token: SeSecurityPrivilege 520 WMIC.exe Token: SeTakeOwnershipPrivilege 520 WMIC.exe Token: SeLoadDriverPrivilege 520 WMIC.exe Token: SeSystemProfilePrivilege 520 WMIC.exe Token: SeSystemtimePrivilege 520 WMIC.exe Token: SeProfSingleProcessPrivilege 520 WMIC.exe Token: SeIncBasePriorityPrivilege 520 WMIC.exe Token: SeCreatePagefilePrivilege 520 WMIC.exe Token: SeBackupPrivilege 520 WMIC.exe Token: SeRestorePrivilege 520 WMIC.exe Token: SeShutdownPrivilege 520 WMIC.exe Token: SeDebugPrivilege 520 WMIC.exe Token: SeSystemEnvironmentPrivilege 520 WMIC.exe Token: SeRemoteShutdownPrivilege 520 WMIC.exe Token: SeUndockPrivilege 520 WMIC.exe Token: SeManageVolumePrivilege 520 WMIC.exe Token: 33 520 WMIC.exe Token: 34 520 WMIC.exe Token: 35 520 WMIC.exe Token: SeBackupPrivilege 1556 vssvc.exe Token: SeRestorePrivilege 1556 vssvc.exe Token: SeAuditPrivilege 1556 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exemkxclxlfdenv.exemkxclxlfdenv.exedescription pid Process procid_target PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1076 wrote to memory of 1928 1076 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 27 PID 1928 wrote to memory of 980 1928 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 28 PID 1928 wrote to memory of 980 1928 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 28 PID 1928 wrote to memory of 980 1928 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 28 PID 1928 wrote to memory of 980 1928 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 28 PID 1928 wrote to memory of 1948 1928 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 29 PID 1928 wrote to memory of 1948 1928 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 29 PID 1928 wrote to memory of 1948 1928 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 29 PID 1928 wrote to memory of 1948 1928 37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe 29 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 980 wrote to memory of 1728 980 mkxclxlfdenv.exe 31 PID 1728 wrote to memory of 520 1728 mkxclxlfdenv.exe 32 PID 1728 wrote to memory of 520 1728 mkxclxlfdenv.exe 32 PID 1728 wrote to memory of 520 1728 mkxclxlfdenv.exe 32 PID 1728 wrote to memory of 520 1728 mkxclxlfdenv.exe 32 -
System policy modification 1 TTPs 2 IoCs
Processes:
mkxclxlfdenv.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mkxclxlfdenv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mkxclxlfdenv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe"C:\Users\Admin\AppData\Local\Temp\37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe"C:\Users\Admin\AppData\Local\Temp\37c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\mkxclxlfdenv.exeC:\Windows\mkxclxlfdenv.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\mkxclxlfdenv.exeC:\Windows\mkxclxlfdenv.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1728 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\37C840~1.EXE3⤵
- Deletes itself
PID:1948
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD52a6d24e8860bbd84be02f3062d16a753
SHA1f7d4cf1c34c98c365b6d0db5da54fffc1f6cf70d
SHA25637c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1
SHA512602cd0a0d3d3fc7c55a21fc43672e5611044f450e10b13df597504867ef62d58dbef4e1730fdff4c1d0c7bfe6d43503de3827d3f407788e937e886593bd2412b
-
Filesize
352KB
MD52a6d24e8860bbd84be02f3062d16a753
SHA1f7d4cf1c34c98c365b6d0db5da54fffc1f6cf70d
SHA25637c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1
SHA512602cd0a0d3d3fc7c55a21fc43672e5611044f450e10b13df597504867ef62d58dbef4e1730fdff4c1d0c7bfe6d43503de3827d3f407788e937e886593bd2412b
-
Filesize
352KB
MD52a6d24e8860bbd84be02f3062d16a753
SHA1f7d4cf1c34c98c365b6d0db5da54fffc1f6cf70d
SHA25637c84094c452b235cc310346dea26829afe3e714383ccfa03beeaadd952200e1
SHA512602cd0a0d3d3fc7c55a21fc43672e5611044f450e10b13df597504867ef62d58dbef4e1730fdff4c1d0c7bfe6d43503de3827d3f407788e937e886593bd2412b