Analysis
-
max time kernel
189s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 09:08
Static task
static1
Behavioral task
behavioral1
Sample
46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe
Resource
win10v2004-20220414-en
General
-
Target
46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe
-
Size
332KB
-
MD5
5cba922e9b586ee49fe760c0b77a85d1
-
SHA1
ee00dcce8f00c6e531d129b5658d5563aadafe70
-
SHA256
46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104
-
SHA512
f1e62a27af6fcc3f516cf001aa3559b5273d76eb03f12ac618677d62e953639d31f6fb2cd4dd00726c32516cc56c17ad26fa8f8a1a72c71f1369a751c946a502
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2277218442-1199762539-2004043321-1000\_RECOVERY_+bdsqg.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/F7E3AE2351BC6BA6
http://tes543berda73i48fsdfsd.keratadze.at/F7E3AE2351BC6BA6
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/F7E3AE2351BC6BA6
http://xlowfznrg4wf7dli.ONION/F7E3AE2351BC6BA6
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
pgrrgecwttxo.exepid Process 1220 pgrrgecwttxo.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1744 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
pgrrgecwttxo.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run pgrrgecwttxo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\tktoflvfwibs = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\pgrrgecwttxo.exe\"" pgrrgecwttxo.exe -
Drops file in Program Files directory 64 IoCs
Processes:
pgrrgecwttxo.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\_RECOVERY_+bdsqg.png pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\_RECOVERY_+bdsqg.png pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\readme.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\_RECOVERY_+bdsqg.png pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\_RECOVERY_+bdsqg.png pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_RECOVERY_+bdsqg.png pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\_RECOVERY_+bdsqg.png pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\License.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\_RECOVERY_+bdsqg.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\_RECOVERY_+bdsqg.html pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt pgrrgecwttxo.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\_RECOVERY_+bdsqg.png pgrrgecwttxo.exe -
Drops file in Windows directory 2 IoCs
Processes:
46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exedescription ioc Process File created C:\Windows\pgrrgecwttxo.exe 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe File opened for modification C:\Windows\pgrrgecwttxo.exe 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
pgrrgecwttxo.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 pgrrgecwttxo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 pgrrgecwttxo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 pgrrgecwttxo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 pgrrgecwttxo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 pgrrgecwttxo.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 pgrrgecwttxo.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pgrrgecwttxo.exepid Process 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe 1220 pgrrgecwttxo.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exepgrrgecwttxo.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 2008 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe Token: SeDebugPrivilege 1220 pgrrgecwttxo.exe Token: SeIncreaseQuotaPrivilege 1480 WMIC.exe Token: SeSecurityPrivilege 1480 WMIC.exe Token: SeTakeOwnershipPrivilege 1480 WMIC.exe Token: SeLoadDriverPrivilege 1480 WMIC.exe Token: SeSystemProfilePrivilege 1480 WMIC.exe Token: SeSystemtimePrivilege 1480 WMIC.exe Token: SeProfSingleProcessPrivilege 1480 WMIC.exe Token: SeIncBasePriorityPrivilege 1480 WMIC.exe Token: SeCreatePagefilePrivilege 1480 WMIC.exe Token: SeBackupPrivilege 1480 WMIC.exe Token: SeRestorePrivilege 1480 WMIC.exe Token: SeShutdownPrivilege 1480 WMIC.exe Token: SeDebugPrivilege 1480 WMIC.exe Token: SeSystemEnvironmentPrivilege 1480 WMIC.exe Token: SeRemoteShutdownPrivilege 1480 WMIC.exe Token: SeUndockPrivilege 1480 WMIC.exe Token: SeManageVolumePrivilege 1480 WMIC.exe Token: 33 1480 WMIC.exe Token: 34 1480 WMIC.exe Token: 35 1480 WMIC.exe Token: SeIncreaseQuotaPrivilege 1480 WMIC.exe Token: SeSecurityPrivilege 1480 WMIC.exe Token: SeTakeOwnershipPrivilege 1480 WMIC.exe Token: SeLoadDriverPrivilege 1480 WMIC.exe Token: SeSystemProfilePrivilege 1480 WMIC.exe Token: SeSystemtimePrivilege 1480 WMIC.exe Token: SeProfSingleProcessPrivilege 1480 WMIC.exe Token: SeIncBasePriorityPrivilege 1480 WMIC.exe Token: SeCreatePagefilePrivilege 1480 WMIC.exe Token: SeBackupPrivilege 1480 WMIC.exe Token: SeRestorePrivilege 1480 WMIC.exe Token: SeShutdownPrivilege 1480 WMIC.exe Token: SeDebugPrivilege 1480 WMIC.exe Token: SeSystemEnvironmentPrivilege 1480 WMIC.exe Token: SeRemoteShutdownPrivilege 1480 WMIC.exe Token: SeUndockPrivilege 1480 WMIC.exe Token: SeManageVolumePrivilege 1480 WMIC.exe Token: 33 1480 WMIC.exe Token: 34 1480 WMIC.exe Token: 35 1480 WMIC.exe Token: SeBackupPrivilege 576 vssvc.exe Token: SeRestorePrivilege 576 vssvc.exe Token: SeAuditPrivilege 576 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exepgrrgecwttxo.exedescription pid Process procid_target PID 2008 wrote to memory of 1220 2008 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe 27 PID 2008 wrote to memory of 1220 2008 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe 27 PID 2008 wrote to memory of 1220 2008 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe 27 PID 2008 wrote to memory of 1220 2008 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe 27 PID 2008 wrote to memory of 1744 2008 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe 28 PID 2008 wrote to memory of 1744 2008 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe 28 PID 2008 wrote to memory of 1744 2008 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe 28 PID 2008 wrote to memory of 1744 2008 46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe 28 PID 1220 wrote to memory of 1480 1220 pgrrgecwttxo.exe 30 PID 1220 wrote to memory of 1480 1220 pgrrgecwttxo.exe 30 PID 1220 wrote to memory of 1480 1220 pgrrgecwttxo.exe 30 PID 1220 wrote to memory of 1480 1220 pgrrgecwttxo.exe 30 -
System policy modification 1 TTPs 2 IoCs
Processes:
pgrrgecwttxo.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pgrrgecwttxo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" pgrrgecwttxo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe"C:\Users\Admin\AppData\Local\Temp\46524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\pgrrgecwttxo.exeC:\Windows\pgrrgecwttxo.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1220 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\46524B~1.EXE2⤵
- Deletes itself
PID:1744
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD55cba922e9b586ee49fe760c0b77a85d1
SHA1ee00dcce8f00c6e531d129b5658d5563aadafe70
SHA25646524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104
SHA512f1e62a27af6fcc3f516cf001aa3559b5273d76eb03f12ac618677d62e953639d31f6fb2cd4dd00726c32516cc56c17ad26fa8f8a1a72c71f1369a751c946a502
-
Filesize
332KB
MD55cba922e9b586ee49fe760c0b77a85d1
SHA1ee00dcce8f00c6e531d129b5658d5563aadafe70
SHA25646524bcdf035245970c0c89390aeaa51393535064a577e1ff8799915712dc104
SHA512f1e62a27af6fcc3f516cf001aa3559b5273d76eb03f12ac618677d62e953639d31f6fb2cd4dd00726c32516cc56c17ad26fa8f8a1a72c71f1369a751c946a502