Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25/06/2022, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe
Resource
win10v2004-20220414-en
General
-
Target
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe
-
Size
312KB
-
MD5
93fccd57d1718dcc740cba5c9df7bdc2
-
SHA1
b3ce3fb78963e0196938be515c0dd294d1719ee9
-
SHA256
395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f
-
SHA512
6f36a3bbe3abdaedf58657d8b0e2e14ac96c418cb45499623283e88b265e30fddf349ee79c6c068f762b7d7156fc24e884a6f6fb1bc8eed9ed47761e428ddc7f
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+wsoef.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/44145BAC15ABF0
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/44145BAC15ABF0
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/44145BAC15ABF0
http://xlowfznrg4wf7dli.ONION/44145BAC15ABF0
Extracted
C:\$Recycle.Bin\S-1-5-21-1809750270-3141839489-3074374771-1000\_ReCoVeRy_+wsoef.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 2704 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation gwbbaddhmrut.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN gwbbaddhmrut.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cihrwct = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\gwbbaddhmrut.exe" gwbbaddhmrut.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5064 set thread context of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 2704 set thread context of 3764 2704 gwbbaddhmrut.exe 92 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailLargeTile.scale-150.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_ReCoVeRy_+wsoef.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SplashScreen.scale-100_contrast-black.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderLargeTile.contrast-white_scale-100.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\Assets\[email protected] gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-16_altform-unplated.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-16_altform-lightunplated.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-24_altform-unplated.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.scale-200.png gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\_ReCoVeRy_+wsoef.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_BadgeLogo.scale-200.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-30_altform-unplated_contrast-white.png gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-black_scale-140.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-16_altform-lightunplated.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ms-MY\View3d\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-400_contrast-white.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_2019.1111.2029.0_neutral_~_8wekyb3d8bbwe\_ReCoVeRy_+wsoef.txt gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\_ReCoVeRy_+wsoef.txt gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\174.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_ReCoVeRy_+wsoef.txt gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+wsoef.txt gwbbaddhmrut.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-24_altform-unplated.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\PaintAppList.targetsize-16.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-16_contrast-black.png gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\_ReCoVeRy_+wsoef.txt gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\_ReCoVeRy_+wsoef.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubSmallTile.scale-125.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubStoreLogo.scale-100.png gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.PPT gwbbaddhmrut.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\_ReCoVeRy_+wsoef.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\8.jpg gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\notificationsUI\fabric.min.css gwbbaddhmrut.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\_ReCoVeRy_+wsoef.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-96_contrast-white.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\hi\_ReCoVeRy_+wsoef.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-BR\_ReCoVeRy_+wsoef.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Google.scale-400.png gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\41C6BC7E-B7DF-49B4-8B0C-7BBB37A0E0FB\root\vfs\Windows\assembly\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\x86\_ReCoVeRy_+wsoef.txt gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarBadge.scale-150.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-GB\en-GB_female_TTS\_ReCoVeRy_+wsoef.txt gwbbaddhmrut.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\_ReCoVeRy_+wsoef.txt gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageBadgeLogo.scale-150_contrast-black.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+wsoef.txt gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNotebookMedTile.scale-400.png gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Web Server Extensions\16\_ReCoVeRy_+wsoef.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\StopwatchMedTile.contrast-white_scale-100.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionSmallTile.scale-400.png gwbbaddhmrut.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\Snooze.scale-80.png gwbbaddhmrut.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_ReCoVeRy_+wsoef.png gwbbaddhmrut.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\_ReCoVeRy_+wsoef.html gwbbaddhmrut.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\gwbbaddhmrut.exe 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe File created C:\Windows\gwbbaddhmrut.exe 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe 3764 gwbbaddhmrut.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 4192 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe Token: SeDebugPrivilege 3764 gwbbaddhmrut.exe Token: SeIncreaseQuotaPrivilege 3936 WMIC.exe Token: SeSecurityPrivilege 3936 WMIC.exe Token: SeTakeOwnershipPrivilege 3936 WMIC.exe Token: SeLoadDriverPrivilege 3936 WMIC.exe Token: SeSystemProfilePrivilege 3936 WMIC.exe Token: SeSystemtimePrivilege 3936 WMIC.exe Token: SeProfSingleProcessPrivilege 3936 WMIC.exe Token: SeIncBasePriorityPrivilege 3936 WMIC.exe Token: SeCreatePagefilePrivilege 3936 WMIC.exe Token: SeBackupPrivilege 3936 WMIC.exe Token: SeRestorePrivilege 3936 WMIC.exe Token: SeShutdownPrivilege 3936 WMIC.exe Token: SeDebugPrivilege 3936 WMIC.exe Token: SeSystemEnvironmentPrivilege 3936 WMIC.exe Token: SeRemoteShutdownPrivilege 3936 WMIC.exe Token: SeUndockPrivilege 3936 WMIC.exe Token: SeManageVolumePrivilege 3936 WMIC.exe Token: 33 3936 WMIC.exe Token: 34 3936 WMIC.exe Token: 35 3936 WMIC.exe Token: 36 3936 WMIC.exe Token: SeIncreaseQuotaPrivilege 3936 WMIC.exe Token: SeSecurityPrivilege 3936 WMIC.exe Token: SeTakeOwnershipPrivilege 3936 WMIC.exe Token: SeLoadDriverPrivilege 3936 WMIC.exe Token: SeSystemProfilePrivilege 3936 WMIC.exe Token: SeSystemtimePrivilege 3936 WMIC.exe Token: SeProfSingleProcessPrivilege 3936 WMIC.exe Token: SeIncBasePriorityPrivilege 3936 WMIC.exe Token: SeCreatePagefilePrivilege 3936 WMIC.exe Token: SeBackupPrivilege 3936 WMIC.exe Token: SeRestorePrivilege 3936 WMIC.exe Token: SeShutdownPrivilege 3936 WMIC.exe Token: SeDebugPrivilege 3936 WMIC.exe Token: SeSystemEnvironmentPrivilege 3936 WMIC.exe Token: SeRemoteShutdownPrivilege 3936 WMIC.exe Token: SeUndockPrivilege 3936 WMIC.exe Token: SeManageVolumePrivilege 3936 WMIC.exe Token: 33 3936 WMIC.exe Token: 34 3936 WMIC.exe Token: 35 3936 WMIC.exe Token: 36 3936 WMIC.exe Token: SeBackupPrivilege 4664 vssvc.exe Token: SeRestorePrivilege 4664 vssvc.exe Token: SeAuditPrivilege 4664 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 5064 wrote to memory of 4192 5064 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 88 PID 4192 wrote to memory of 2704 4192 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 89 PID 4192 wrote to memory of 2704 4192 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 89 PID 4192 wrote to memory of 2704 4192 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 89 PID 4192 wrote to memory of 4808 4192 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 90 PID 4192 wrote to memory of 4808 4192 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 90 PID 4192 wrote to memory of 4808 4192 395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe 90 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 2704 wrote to memory of 3764 2704 gwbbaddhmrut.exe 92 PID 3764 wrote to memory of 3936 3764 gwbbaddhmrut.exe 93 PID 3764 wrote to memory of 3936 3764 gwbbaddhmrut.exe 93 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gwbbaddhmrut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" gwbbaddhmrut.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe"C:\Users\Admin\AppData\Local\Temp\395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe"C:\Users\Admin\AppData\Local\Temp\395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\gwbbaddhmrut.exeC:\Windows\gwbbaddhmrut.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\gwbbaddhmrut.exeC:\Windows\gwbbaddhmrut.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3764 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\395133~1.EXE3⤵PID:4808
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD593fccd57d1718dcc740cba5c9df7bdc2
SHA1b3ce3fb78963e0196938be515c0dd294d1719ee9
SHA256395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f
SHA5126f36a3bbe3abdaedf58657d8b0e2e14ac96c418cb45499623283e88b265e30fddf349ee79c6c068f762b7d7156fc24e884a6f6fb1bc8eed9ed47761e428ddc7f
-
Filesize
312KB
MD593fccd57d1718dcc740cba5c9df7bdc2
SHA1b3ce3fb78963e0196938be515c0dd294d1719ee9
SHA256395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f
SHA5126f36a3bbe3abdaedf58657d8b0e2e14ac96c418cb45499623283e88b265e30fddf349ee79c6c068f762b7d7156fc24e884a6f6fb1bc8eed9ed47761e428ddc7f
-
Filesize
312KB
MD593fccd57d1718dcc740cba5c9df7bdc2
SHA1b3ce3fb78963e0196938be515c0dd294d1719ee9
SHA256395133a5c04592b4f67fbf3f7ceb741ac1ba799cde17ef646da54e19d9b1b57f
SHA5126f36a3bbe3abdaedf58657d8b0e2e14ac96c418cb45499623283e88b265e30fddf349ee79c6c068f762b7d7156fc24e884a6f6fb1bc8eed9ed47761e428ddc7f