Analysis
-
max time kernel
72s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-06-2022 18:31
Static task
static1
Behavioral task
behavioral1
Sample
fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe
Resource
win10v2004-20220414-en
General
-
Target
fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe
-
Size
69KB
-
MD5
fcedea8111abbb61e40fa5ed486fd434
-
SHA1
1d837e6ece7ff326fcbeff7994744f7bd5434d99
-
SHA256
fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913
-
SHA512
7d8383b371c3206624fffd844c1af52f5cb0f3b327b06bbe6f657485ba4e70d6390865fc5febaf60eafd9e63cc41c12d0f4e5e99c07951ce0886916b47f123b1
Malware Config
Extracted
C:\Users\Admin\Desktop\EEBF08-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\DebugComplete.png => C:\Users\Admin\Pictures\DebugComplete.png.eebf08 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File renamed C:\Users\Admin\Pictures\CompareBackup.raw => C:\Users\Admin\Pictures\CompareBackup.raw.eebf08 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File renamed C:\Users\Admin\Pictures\StopMount.raw => C:\Users\Admin\Pictures\StopMount.raw.eebf08 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File renamed C:\Users\Admin\Pictures\ProtectJoin.png => C:\Users\Admin\Pictures\ProtectJoin.png.eebf08 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File renamed C:\Users\Admin\Pictures\NewMove.tif => C:\Users\Admin\Pictures\NewMove.tif.eebf08 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File renamed C:\Users\Admin\Pictures\ProtectEnter.raw => C:\Users\Admin\Pictures\ProtectEnter.raw.eebf08 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe -
Deletes itself 1 IoCs
pid Process 3448 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14791_.GIF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00392_.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01750_.GIF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Black Tie.eftx fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\profile.jfc fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105378.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309705.JPG fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\license.html fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Tarawa fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-services.xml fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00413_.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\FLASH.NET.XML fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-modules-appui.jar fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0090070.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-explorer.xml fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Lima fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7cm_en.dub fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME33.CSS fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\EEBF08-Readme.txt fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.xml fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\EEBF08-Readme.txt fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14981_.GIF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\feature.xml fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File created C:\Program Files\EEBF08-Readme.txt fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-profiling_zh_CN.jar fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\macroprogress.gif fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0179963.JPG fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0238927.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Installed_resources14.xss fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CO.KR.XML fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\vlc.mo fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21518_.GIF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00238_.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00178_.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15019_.GIF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00343_.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185806.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text_3.5.300.v20130515-1451.jar fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBSBR.DPV fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Manuscript.dotx fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.800.v20140827-1444.jar fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN102.XML fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD20013_.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs_ja.jar fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.databinding.nl_zh_4.4.0.v20140623020002.jar fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\DADSHIRT.HTM fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\vlc.mo fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Bucharest fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGBOXES.XML fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.ui_5.5.0.165303.jar fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoDev.png fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Apothecary.xml fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsVersion1Warning.htm fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198372.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341653.JPG fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00734_.WMF fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BROCHURE.DPV fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Sts.css fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.extensionlocation.nl_ja_4.4.0.v20140623020002.jar fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ORG97.SAM fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BRCHUR11.POC fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\bookicon.gif fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CMNTY_01.MID fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1896 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 1404 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe Token: SeImpersonatePrivilege 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe Token: SeBackupPrivilege 3960 vssvc.exe Token: SeRestorePrivilege 3960 vssvc.exe Token: SeAuditPrivilege 3960 vssvc.exe Token: SeDebugPrivilege 1404 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 664 wrote to memory of 1896 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 28 PID 664 wrote to memory of 1896 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 28 PID 664 wrote to memory of 1896 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 28 PID 664 wrote to memory of 1896 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 28 PID 664 wrote to memory of 4440 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 33 PID 664 wrote to memory of 4440 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 33 PID 664 wrote to memory of 4440 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 33 PID 664 wrote to memory of 4440 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 33 PID 664 wrote to memory of 3448 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 34 PID 664 wrote to memory of 3448 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 34 PID 664 wrote to memory of 3448 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 34 PID 664 wrote to memory of 3448 664 fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe 34 PID 3448 wrote to memory of 1404 3448 cmd.exe 36 PID 3448 wrote to memory of 1404 3448 cmd.exe 36 PID 3448 wrote to memory of 1404 3448 cmd.exe 36 PID 3448 wrote to memory of 1404 3448 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe"C:\Users\Admin\AppData\Local\Temp\fd3489f6067ef7ca3999776205839424cb7349134baaeb693abcecaa2c5bf913.exe"1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1896
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\EEBF08-Readme.txt"2⤵PID:4440
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\FB12.tmp.bat"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 6643⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140B
MD528a76413d7e9f352530ab229a9e1ae12
SHA1c620cbe7c8c760d34dab725520a2ec68149549c9
SHA2560dcf3a5860fcf988a2c254136445faab4f266939d328c96ebd89e2b73faf3961
SHA512e54a837b24728392850a239b9f5feeb7bb63c6d4e033f53848127023cff4c2c5ca326290f033eccb3ab9b9427e43771f0b60629951107628743d6b63f36bb1d5
-
Filesize
1KB
MD544285a652e1bbeb82ea20abb5a67f42e
SHA11274089a6b6d59b9271d7d0de3762b201e54a8d0
SHA25627df9a46eec75ec418bd0922fde68d7c1f795ceb82a20fa42a914a1088153c77
SHA512305359e0f860d10e6c4266a53fe62f507b587301020eb27a533eca0214f4597f3064ec618a776b448417e2647b4f13a01c293c2ba1fc9671da28c814e3df82f3