Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 23:39
Static task
static1
Behavioral task
behavioral1
Sample
4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe
Resource
win10v2004-20220414-en
General
-
Target
4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe
-
Size
364KB
-
MD5
66b7af9f37cd6513cd89e7d36a624970
-
SHA1
3c1ce2cd00661ea788f7f87a357231f0e50c6bf5
-
SHA256
4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297
-
SHA512
26a7f66824b946c6bc2d40ba4560e5d343b4d5f86d9bc9b4a19e57a0b7149d60b611ed8f1d30641b48a68d4861e0c35c4f38977a377c75601b02b675774b27b9
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECOVERY_+brrrb.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/4BC8966FA7B35E5D
http://tes543berda73i48fsdfsd.keratadze.at/4BC8966FA7B35E5D
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/4BC8966FA7B35E5D
http://xlowfznrg4wf7dli.ONION/4BC8966FA7B35E5D
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
dwryckvyonxo.exedwryckvyonxo.exepid Process 320 dwryckvyonxo.exe 916 dwryckvyonxo.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1240 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dwryckvyonxo.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run dwryckvyonxo.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\disdespslmwt = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\dwryckvyonxo.exe\"" dwryckvyonxo.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exedwryckvyonxo.exedescription pid Process procid_target PID 1868 set thread context of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 320 set thread context of 916 320 dwryckvyonxo.exe 30 -
Drops file in Program Files directory 64 IoCs
Processes:
dwryckvyonxo.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\enu-dsk\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt dwryckvyonxo.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\_RECOVERY_+brrrb.html dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\_RECOVERY_+brrrb.txt dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\_RECOVERY_+brrrb.png dwryckvyonxo.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\ja-JP\_RECOVERY_+brrrb.html dwryckvyonxo.exe -
Drops file in Windows directory 2 IoCs
Processes:
4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exedescription ioc Process File created C:\Windows\dwryckvyonxo.exe 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe File opened for modification C:\Windows\dwryckvyonxo.exe 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
dwryckvyonxo.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 dwryckvyonxo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 dwryckvyonxo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 dwryckvyonxo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 dwryckvyonxo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 dwryckvyonxo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 dwryckvyonxo.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dwryckvyonxo.exepid Process 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe 916 dwryckvyonxo.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exedwryckvyonxo.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1456 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe Token: SeDebugPrivilege 916 dwryckvyonxo.exe Token: SeIncreaseQuotaPrivilege 1848 WMIC.exe Token: SeSecurityPrivilege 1848 WMIC.exe Token: SeTakeOwnershipPrivilege 1848 WMIC.exe Token: SeLoadDriverPrivilege 1848 WMIC.exe Token: SeSystemProfilePrivilege 1848 WMIC.exe Token: SeSystemtimePrivilege 1848 WMIC.exe Token: SeProfSingleProcessPrivilege 1848 WMIC.exe Token: SeIncBasePriorityPrivilege 1848 WMIC.exe Token: SeCreatePagefilePrivilege 1848 WMIC.exe Token: SeBackupPrivilege 1848 WMIC.exe Token: SeRestorePrivilege 1848 WMIC.exe Token: SeShutdownPrivilege 1848 WMIC.exe Token: SeDebugPrivilege 1848 WMIC.exe Token: SeSystemEnvironmentPrivilege 1848 WMIC.exe Token: SeRemoteShutdownPrivilege 1848 WMIC.exe Token: SeUndockPrivilege 1848 WMIC.exe Token: SeManageVolumePrivilege 1848 WMIC.exe Token: 33 1848 WMIC.exe Token: 34 1848 WMIC.exe Token: 35 1848 WMIC.exe Token: SeIncreaseQuotaPrivilege 1848 WMIC.exe Token: SeSecurityPrivilege 1848 WMIC.exe Token: SeTakeOwnershipPrivilege 1848 WMIC.exe Token: SeLoadDriverPrivilege 1848 WMIC.exe Token: SeSystemProfilePrivilege 1848 WMIC.exe Token: SeSystemtimePrivilege 1848 WMIC.exe Token: SeProfSingleProcessPrivilege 1848 WMIC.exe Token: SeIncBasePriorityPrivilege 1848 WMIC.exe Token: SeCreatePagefilePrivilege 1848 WMIC.exe Token: SeBackupPrivilege 1848 WMIC.exe Token: SeRestorePrivilege 1848 WMIC.exe Token: SeShutdownPrivilege 1848 WMIC.exe Token: SeDebugPrivilege 1848 WMIC.exe Token: SeSystemEnvironmentPrivilege 1848 WMIC.exe Token: SeRemoteShutdownPrivilege 1848 WMIC.exe Token: SeUndockPrivilege 1848 WMIC.exe Token: SeManageVolumePrivilege 1848 WMIC.exe Token: 33 1848 WMIC.exe Token: 34 1848 WMIC.exe Token: 35 1848 WMIC.exe Token: SeBackupPrivilege 1944 vssvc.exe Token: SeRestorePrivilege 1944 vssvc.exe Token: SeAuditPrivilege 1944 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exedwryckvyonxo.exedwryckvyonxo.exedescription pid Process procid_target PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1868 wrote to memory of 1456 1868 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 26 PID 1456 wrote to memory of 320 1456 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 27 PID 1456 wrote to memory of 320 1456 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 27 PID 1456 wrote to memory of 320 1456 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 27 PID 1456 wrote to memory of 320 1456 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 27 PID 1456 wrote to memory of 1240 1456 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 28 PID 1456 wrote to memory of 1240 1456 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 28 PID 1456 wrote to memory of 1240 1456 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 28 PID 1456 wrote to memory of 1240 1456 4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe 28 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 320 wrote to memory of 916 320 dwryckvyonxo.exe 30 PID 916 wrote to memory of 1848 916 dwryckvyonxo.exe 31 PID 916 wrote to memory of 1848 916 dwryckvyonxo.exe 31 PID 916 wrote to memory of 1848 916 dwryckvyonxo.exe 31 PID 916 wrote to memory of 1848 916 dwryckvyonxo.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
dwryckvyonxo.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System dwryckvyonxo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" dwryckvyonxo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe"C:\Users\Admin\AppData\Local\Temp\4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe"C:\Users\Admin\AppData\Local\Temp\4333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\dwryckvyonxo.exeC:\Windows\dwryckvyonxo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\dwryckvyonxo.exeC:\Windows\dwryckvyonxo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:916 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\433375~1.EXE3⤵
- Deletes itself
PID:1240
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD566b7af9f37cd6513cd89e7d36a624970
SHA13c1ce2cd00661ea788f7f87a357231f0e50c6bf5
SHA2564333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297
SHA51226a7f66824b946c6bc2d40ba4560e5d343b4d5f86d9bc9b4a19e57a0b7149d60b611ed8f1d30641b48a68d4861e0c35c4f38977a377c75601b02b675774b27b9
-
Filesize
364KB
MD566b7af9f37cd6513cd89e7d36a624970
SHA13c1ce2cd00661ea788f7f87a357231f0e50c6bf5
SHA2564333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297
SHA51226a7f66824b946c6bc2d40ba4560e5d343b4d5f86d9bc9b4a19e57a0b7149d60b611ed8f1d30641b48a68d4861e0c35c4f38977a377c75601b02b675774b27b9
-
Filesize
364KB
MD566b7af9f37cd6513cd89e7d36a624970
SHA13c1ce2cd00661ea788f7f87a357231f0e50c6bf5
SHA2564333756d10fc0b287f7e0a23d9303f74b4fad2ec2a97a90c55d1b1d320e9c297
SHA51226a7f66824b946c6bc2d40ba4560e5d343b4d5f86d9bc9b4a19e57a0b7149d60b611ed8f1d30641b48a68d4861e0c35c4f38977a377c75601b02b675774b27b9