Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25/06/2022, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe
Resource
win10v2004-20220414-en
General
-
Target
398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe
-
Size
280KB
-
MD5
61b57f81ee04299f8ba3c16d15505363
-
SHA1
13001b7875921a5ec553f11cc7c2e2f129179ef9
-
SHA256
398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1
-
SHA512
ce9326ae5cf48a739ea1b373e4f926804f07ded2bd476400474885c2548f3b56f5f33af2b193e6dbe1d6f5666c1ec506a8a80268582770cbb35b97e1e8a9b78e
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+vqnhc.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A32F763A7DF42F5
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/A32F763A7DF42F5
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/A32F763A7DF42F5
http://xlowfznrg4wf7dli.ONION/A32F763A7DF42F5
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+vqnhc.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 2672 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation ppgqwbhiceon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN ppgqwbhiceon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xnqhpfe = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\ppgqwbhiceon.exe" ppgqwbhiceon.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4740 set thread context of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 2672 set thread context of 3320 2672 ppgqwbhiceon.exe 92 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\main.css ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_neutral_split.scale-100_8wekyb3d8bbwe\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-96_altform-unplated_contrast-white.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Yahoo-Light.scale-100.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\SmallTile.scale-100.png ppgqwbhiceon.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css ppgqwbhiceon.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\locale\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\ExchangeBadge.scale-125.png ppgqwbhiceon.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUEPRNT\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EXPEDITN\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\fonts\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\HoloAssets\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\Office16\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\AppPackageBadgeLogo.scale-100_contrast-white.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sk-SK\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\Win10\MicrosoftSolitaireMedTile.scale-125.jpg ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-30_altform-unplated_contrast-black.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxWideTile.scale-400.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreAppList.scale-200.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Background_Safety_NoObjects.jpg ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-30_altform-unplated.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\SkypeForBusinessBasic2019_eula.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\StoreLogo.scale-125.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNotebookSmallTile.scale-400.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\LargeTile.scale-100.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteLargeTile.scale-400.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SmallTile.scale-125_contrast-black.png ppgqwbhiceon.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeLogo.scale-200_contrast-black.png ppgqwbhiceon.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_globalstyle.css ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Spacer\4px.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-96_altform-unplated.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailMediumTile.scale-200.png ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.1808.3.0_x64__8wekyb3d8bbwe\Microsoft.Advertising\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-96_altform-unplated_contrast-white.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\Fonts\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\_ReCoVeRy_+vqnhc.png ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\kk\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GamesXboxHubBadgeLogo.scale-200_contrast-white.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Fonts\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\Office15\_ReCoVeRy_+vqnhc.txt ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-256_altform-unplated.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\OrientationControlInnerCircle.png ppgqwbhiceon.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Web Server Extensions\16\BIN\_ReCoVeRy_+vqnhc.html ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-48_altform-unplated_contrast-black.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-36.png ppgqwbhiceon.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\SmallTile.scale-100.png ppgqwbhiceon.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ppgqwbhiceon.exe 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe File opened for modification C:\Windows\ppgqwbhiceon.exe 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe 3320 ppgqwbhiceon.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 4920 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe Token: SeDebugPrivilege 3320 ppgqwbhiceon.exe Token: SeIncreaseQuotaPrivilege 1040 WMIC.exe Token: SeSecurityPrivilege 1040 WMIC.exe Token: SeTakeOwnershipPrivilege 1040 WMIC.exe Token: SeLoadDriverPrivilege 1040 WMIC.exe Token: SeSystemProfilePrivilege 1040 WMIC.exe Token: SeSystemtimePrivilege 1040 WMIC.exe Token: SeProfSingleProcessPrivilege 1040 WMIC.exe Token: SeIncBasePriorityPrivilege 1040 WMIC.exe Token: SeCreatePagefilePrivilege 1040 WMIC.exe Token: SeBackupPrivilege 1040 WMIC.exe Token: SeRestorePrivilege 1040 WMIC.exe Token: SeShutdownPrivilege 1040 WMIC.exe Token: SeDebugPrivilege 1040 WMIC.exe Token: SeSystemEnvironmentPrivilege 1040 WMIC.exe Token: SeRemoteShutdownPrivilege 1040 WMIC.exe Token: SeUndockPrivilege 1040 WMIC.exe Token: SeManageVolumePrivilege 1040 WMIC.exe Token: 33 1040 WMIC.exe Token: 34 1040 WMIC.exe Token: 35 1040 WMIC.exe Token: 36 1040 WMIC.exe Token: SeIncreaseQuotaPrivilege 1040 WMIC.exe Token: SeSecurityPrivilege 1040 WMIC.exe Token: SeTakeOwnershipPrivilege 1040 WMIC.exe Token: SeLoadDriverPrivilege 1040 WMIC.exe Token: SeSystemProfilePrivilege 1040 WMIC.exe Token: SeSystemtimePrivilege 1040 WMIC.exe Token: SeProfSingleProcessPrivilege 1040 WMIC.exe Token: SeIncBasePriorityPrivilege 1040 WMIC.exe Token: SeCreatePagefilePrivilege 1040 WMIC.exe Token: SeBackupPrivilege 1040 WMIC.exe Token: SeRestorePrivilege 1040 WMIC.exe Token: SeShutdownPrivilege 1040 WMIC.exe Token: SeDebugPrivilege 1040 WMIC.exe Token: SeSystemEnvironmentPrivilege 1040 WMIC.exe Token: SeRemoteShutdownPrivilege 1040 WMIC.exe Token: SeUndockPrivilege 1040 WMIC.exe Token: SeManageVolumePrivilege 1040 WMIC.exe Token: 33 1040 WMIC.exe Token: 34 1040 WMIC.exe Token: 35 1040 WMIC.exe Token: 36 1040 WMIC.exe Token: SeBackupPrivilege 4484 vssvc.exe Token: SeRestorePrivilege 4484 vssvc.exe Token: SeAuditPrivilege 4484 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4740 wrote to memory of 4920 4740 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 88 PID 4920 wrote to memory of 2672 4920 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 89 PID 4920 wrote to memory of 2672 4920 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 89 PID 4920 wrote to memory of 2672 4920 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 89 PID 4920 wrote to memory of 3452 4920 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 90 PID 4920 wrote to memory of 3452 4920 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 90 PID 4920 wrote to memory of 3452 4920 398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe 90 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 2672 wrote to memory of 3320 2672 ppgqwbhiceon.exe 92 PID 3320 wrote to memory of 1040 3320 ppgqwbhiceon.exe 93 PID 3320 wrote to memory of 1040 3320 ppgqwbhiceon.exe 93 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ppgqwbhiceon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ppgqwbhiceon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe"C:\Users\Admin\AppData\Local\Temp\398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe"C:\Users\Admin\AppData\Local\Temp\398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\ppgqwbhiceon.exeC:\Windows\ppgqwbhiceon.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\ppgqwbhiceon.exeC:\Windows\ppgqwbhiceon.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3320 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\398A2A~1.EXE3⤵PID:3452
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD561b57f81ee04299f8ba3c16d15505363
SHA113001b7875921a5ec553f11cc7c2e2f129179ef9
SHA256398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1
SHA512ce9326ae5cf48a739ea1b373e4f926804f07ded2bd476400474885c2548f3b56f5f33af2b193e6dbe1d6f5666c1ec506a8a80268582770cbb35b97e1e8a9b78e
-
Filesize
280KB
MD561b57f81ee04299f8ba3c16d15505363
SHA113001b7875921a5ec553f11cc7c2e2f129179ef9
SHA256398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1
SHA512ce9326ae5cf48a739ea1b373e4f926804f07ded2bd476400474885c2548f3b56f5f33af2b193e6dbe1d6f5666c1ec506a8a80268582770cbb35b97e1e8a9b78e
-
Filesize
280KB
MD561b57f81ee04299f8ba3c16d15505363
SHA113001b7875921a5ec553f11cc7c2e2f129179ef9
SHA256398a2a77f0399f0847d224921c35af02502f20579a1d3a5c4641fe158f0354e1
SHA512ce9326ae5cf48a739ea1b373e4f926804f07ded2bd476400474885c2548f3b56f5f33af2b193e6dbe1d6f5666c1ec506a8a80268582770cbb35b97e1e8a9b78e