Overview
overview
10Static
static
8trojan/1.exe
windows7_x64
10trojan/1.exe
windows10-2004_x64
10trojan/10.exe
windows7_x64
10trojan/10.exe
windows10-2004_x64
8trojan/2.exe
windows7_x64
3trojan/2.exe
windows10-2004_x64
5trojan/3.exe
windows7_x64
10trojan/3.exe
windows10-2004_x64
10trojan/4.exe
windows7_x64
8trojan/4.exe
windows10-2004_x64
8trojan/5.exe
windows7_x64
8trojan/5.exe
windows10-2004_x64
8trojan/6.exe
windows7_x64
10trojan/6.exe
windows10-2004_x64
10trojan/7.exe
windows7_x64
10trojan/7.exe
windows10-2004_x64
10trojan/8.exe
windows7_x64
trojan/8.exe
windows10-2004_x64
10trojan/9.exe
windows7_x64
8trojan/9.exe
windows10-2004_x64
8Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 09:24
Static task
static1
Behavioral task
behavioral1
Sample
trojan/1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
trojan/1.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
trojan/10.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
trojan/10.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
trojan/2.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
trojan/2.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
trojan/3.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
trojan/3.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
trojan/4.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
trojan/4.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
trojan/5.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
trojan/5.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
trojan/6.exe
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
trojan/6.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
trojan/7.exe
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
trojan/7.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
trojan/8.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
trojan/8.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
trojan/9.exe
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
trojan/9.exe
Resource
win10v2004-20220414-en
General
-
Target
trojan/10.exe
-
Size
216KB
-
MD5
78621f1e196497d440afb57f4609fcf9
-
SHA1
eed7c3bb3fc5181b88abeed2204997f350324022
-
SHA256
4a4be110d587421ad50d2b1a38b108fa05f314631066a2e96a1c85cc05814080
-
SHA512
8bcc845b88710528c45df0ccc1ffc4d52663a2e7b870f7d347dacf2a2a698ea8d7ffc412b14841b5020618be845a0a1ee70e54f2aa86b3a4d8a9c298ff7ced44
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
BruceBoyle@onionmail.org
SylvesterJones@onionmail.org
v-society.official@onionmail.org
http://vsociethok6sbprvevl4dlwbqrzyhxcxaqpvcqt5belwvsuxaxsutyad.onion
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
TrustedInstaller.exeTrustedInstaller.exepid process 952 TrustedInstaller.exe 972 TrustedInstaller.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 1560 notepad.exe -
Loads dropped DLL 2 IoCs
Processes:
10.exepid process 1348 10.exe 1348 10.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
10.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run 10.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\TrustedInstaller.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\TrustedInstaller.exe\" -start" 10.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
TrustedInstaller.exedescription ioc process File opened (read-only) \??\E: TrustedInstaller.exe File opened (read-only) \??\W: TrustedInstaller.exe File opened (read-only) \??\U: TrustedInstaller.exe File opened (read-only) \??\O: TrustedInstaller.exe File opened (read-only) \??\I: TrustedInstaller.exe File opened (read-only) \??\M: TrustedInstaller.exe File opened (read-only) \??\L: TrustedInstaller.exe File opened (read-only) \??\H: TrustedInstaller.exe File opened (read-only) \??\G: TrustedInstaller.exe File opened (read-only) \??\V: TrustedInstaller.exe File opened (read-only) \??\T: TrustedInstaller.exe File opened (read-only) \??\R: TrustedInstaller.exe File opened (read-only) \??\Q: TrustedInstaller.exe File opened (read-only) \??\F: TrustedInstaller.exe File opened (read-only) \??\B: TrustedInstaller.exe File opened (read-only) \??\N: TrustedInstaller.exe File opened (read-only) \??\K: TrustedInstaller.exe File opened (read-only) \??\J: TrustedInstaller.exe File opened (read-only) \??\Z: TrustedInstaller.exe File opened (read-only) \??\X: TrustedInstaller.exe File opened (read-only) \??\S: TrustedInstaller.exe File opened (read-only) \??\P: TrustedInstaller.exe File opened (read-only) \??\Y: TrustedInstaller.exe File opened (read-only) \??\A: TrustedInstaller.exe -
Drops file in Program Files directory 64 IoCs
Processes:
TrustedInstaller.exedescription ioc process File opened for modification C:\Program Files\7-Zip\descript.ion.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\directshowtap.ax TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_SelectionSubpicture.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Perf_Scenes_Mask1.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotslightoverlay.png TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-background.png TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\MeasureDisconnect.scf.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationUp_SelectionSubpicture.png TrustedInstaller.exe File opened for modification C:\Program Files\SelectRevoke.m3u TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\sonicsptransform.ax TrustedInstaller.exe File opened for modification C:\Program Files\CompleteShow.asf.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_RGB6_PAL.wmv TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\rollinghills.png TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIcon.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\SecretST.TTF TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\es-ES\OmdProject.dll.mui TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_image-frame-border.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_scrapbook_Thumbnail.bmp TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground.wmv TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv TrustedInstaller.exe File opened for modification C:\Program Files\ReceiveSearch.xps TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\DVDMaker.exe.mui TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_babypink_Thumbnail.bmp TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_SelectionSubpicture.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Title_select-highlight.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Notes_loop.wmv TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\chapters-static.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_rgb.wmv TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-over-DOT.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_plain_Thumbnail.bmp TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-image-mask.png TrustedInstaller.exe File opened for modification C:\Program Files\InvokeConvert.ini.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\History.txt.v-society.567-125-A10 TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt TrustedInstaller.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_PreComp_MATTE_PAL.wmv TrustedInstaller.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_SelectionSubpicture.png TrustedInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1216 vssadmin.exe 112 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
TrustedInstaller.exepid process 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe 952 TrustedInstaller.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
10.exeWMIC.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 1348 10.exe Token: SeDebugPrivilege 1348 10.exe Token: SeIncreaseQuotaPrivilege 568 WMIC.exe Token: SeSecurityPrivilege 568 WMIC.exe Token: SeTakeOwnershipPrivilege 568 WMIC.exe Token: SeLoadDriverPrivilege 568 WMIC.exe Token: SeSystemProfilePrivilege 568 WMIC.exe Token: SeSystemtimePrivilege 568 WMIC.exe Token: SeProfSingleProcessPrivilege 568 WMIC.exe Token: SeIncBasePriorityPrivilege 568 WMIC.exe Token: SeCreatePagefilePrivilege 568 WMIC.exe Token: SeBackupPrivilege 568 WMIC.exe Token: SeRestorePrivilege 568 WMIC.exe Token: SeShutdownPrivilege 568 WMIC.exe Token: SeDebugPrivilege 568 WMIC.exe Token: SeSystemEnvironmentPrivilege 568 WMIC.exe Token: SeRemoteShutdownPrivilege 568 WMIC.exe Token: SeUndockPrivilege 568 WMIC.exe Token: SeManageVolumePrivilege 568 WMIC.exe Token: 33 568 WMIC.exe Token: 34 568 WMIC.exe Token: 35 568 WMIC.exe Token: SeIncreaseQuotaPrivilege 1824 WMIC.exe Token: SeSecurityPrivilege 1824 WMIC.exe Token: SeTakeOwnershipPrivilege 1824 WMIC.exe Token: SeLoadDriverPrivilege 1824 WMIC.exe Token: SeSystemProfilePrivilege 1824 WMIC.exe Token: SeSystemtimePrivilege 1824 WMIC.exe Token: SeProfSingleProcessPrivilege 1824 WMIC.exe Token: SeIncBasePriorityPrivilege 1824 WMIC.exe Token: SeCreatePagefilePrivilege 1824 WMIC.exe Token: SeBackupPrivilege 1824 WMIC.exe Token: SeRestorePrivilege 1824 WMIC.exe Token: SeShutdownPrivilege 1824 WMIC.exe Token: SeDebugPrivilege 1824 WMIC.exe Token: SeSystemEnvironmentPrivilege 1824 WMIC.exe Token: SeRemoteShutdownPrivilege 1824 WMIC.exe Token: SeUndockPrivilege 1824 WMIC.exe Token: SeManageVolumePrivilege 1824 WMIC.exe Token: 33 1824 WMIC.exe Token: 34 1824 WMIC.exe Token: 35 1824 WMIC.exe Token: SeBackupPrivilege 1716 vssvc.exe Token: SeRestorePrivilege 1716 vssvc.exe Token: SeAuditPrivilege 1716 vssvc.exe Token: SeIncreaseQuotaPrivilege 568 WMIC.exe Token: SeSecurityPrivilege 568 WMIC.exe Token: SeTakeOwnershipPrivilege 568 WMIC.exe Token: SeLoadDriverPrivilege 568 WMIC.exe Token: SeSystemProfilePrivilege 568 WMIC.exe Token: SeSystemtimePrivilege 568 WMIC.exe Token: SeProfSingleProcessPrivilege 568 WMIC.exe Token: SeIncBasePriorityPrivilege 568 WMIC.exe Token: SeCreatePagefilePrivilege 568 WMIC.exe Token: SeBackupPrivilege 568 WMIC.exe Token: SeRestorePrivilege 568 WMIC.exe Token: SeShutdownPrivilege 568 WMIC.exe Token: SeDebugPrivilege 568 WMIC.exe Token: SeSystemEnvironmentPrivilege 568 WMIC.exe Token: SeRemoteShutdownPrivilege 568 WMIC.exe Token: SeUndockPrivilege 568 WMIC.exe Token: SeManageVolumePrivilege 568 WMIC.exe Token: 33 568 WMIC.exe Token: 34 568 WMIC.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
10.exeTrustedInstaller.execmd.execmd.execmd.exedescription pid process target process PID 1348 wrote to memory of 952 1348 10.exe TrustedInstaller.exe PID 1348 wrote to memory of 952 1348 10.exe TrustedInstaller.exe PID 1348 wrote to memory of 952 1348 10.exe TrustedInstaller.exe PID 1348 wrote to memory of 952 1348 10.exe TrustedInstaller.exe PID 1348 wrote to memory of 1560 1348 10.exe notepad.exe PID 1348 wrote to memory of 1560 1348 10.exe notepad.exe PID 1348 wrote to memory of 1560 1348 10.exe notepad.exe PID 1348 wrote to memory of 1560 1348 10.exe notepad.exe PID 1348 wrote to memory of 1560 1348 10.exe notepad.exe PID 1348 wrote to memory of 1560 1348 10.exe notepad.exe PID 1348 wrote to memory of 1560 1348 10.exe notepad.exe PID 952 wrote to memory of 1588 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1588 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1588 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1588 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1332 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1332 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1332 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1332 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1980 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1980 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1980 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1980 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 320 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 320 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 320 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 320 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 300 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 300 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 300 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 300 952 TrustedInstaller.exe cmd.exe PID 300 wrote to memory of 1216 300 cmd.exe vssadmin.exe PID 300 wrote to memory of 1216 300 cmd.exe vssadmin.exe PID 300 wrote to memory of 1216 300 cmd.exe vssadmin.exe PID 300 wrote to memory of 1216 300 cmd.exe vssadmin.exe PID 1588 wrote to memory of 1824 1588 cmd.exe WMIC.exe PID 1588 wrote to memory of 1824 1588 cmd.exe WMIC.exe PID 1588 wrote to memory of 1824 1588 cmd.exe WMIC.exe PID 1588 wrote to memory of 1824 1588 cmd.exe WMIC.exe PID 952 wrote to memory of 1388 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1388 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1388 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 1388 952 TrustedInstaller.exe cmd.exe PID 952 wrote to memory of 972 952 TrustedInstaller.exe TrustedInstaller.exe PID 952 wrote to memory of 972 952 TrustedInstaller.exe TrustedInstaller.exe PID 952 wrote to memory of 972 952 TrustedInstaller.exe TrustedInstaller.exe PID 952 wrote to memory of 972 952 TrustedInstaller.exe TrustedInstaller.exe PID 1388 wrote to memory of 568 1388 cmd.exe WMIC.exe PID 1388 wrote to memory of 568 1388 cmd.exe WMIC.exe PID 1388 wrote to memory of 568 1388 cmd.exe WMIC.exe PID 1388 wrote to memory of 568 1388 cmd.exe WMIC.exe PID 1388 wrote to memory of 112 1388 cmd.exe vssadmin.exe PID 1388 wrote to memory of 112 1388 cmd.exe vssadmin.exe PID 1388 wrote to memory of 112 1388 cmd.exe vssadmin.exe PID 1388 wrote to memory of 112 1388 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\trojan\10.exe"C:\Users\Admin\AppData\Local\Temp\trojan\10.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exe" -agent 03⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
- Deletes itself
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\~temp001.batFilesize
406B
MD5ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exeFilesize
216KB
MD578621f1e196497d440afb57f4609fcf9
SHA1eed7c3bb3fc5181b88abeed2204997f350324022
SHA2564a4be110d587421ad50d2b1a38b108fa05f314631066a2e96a1c85cc05814080
SHA5128bcc845b88710528c45df0ccc1ffc4d52663a2e7b870f7d347dacf2a2a698ea8d7ffc412b14841b5020618be845a0a1ee70e54f2aa86b3a4d8a9c298ff7ced44
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exeFilesize
216KB
MD578621f1e196497d440afb57f4609fcf9
SHA1eed7c3bb3fc5181b88abeed2204997f350324022
SHA2564a4be110d587421ad50d2b1a38b108fa05f314631066a2e96a1c85cc05814080
SHA5128bcc845b88710528c45df0ccc1ffc4d52663a2e7b870f7d347dacf2a2a698ea8d7ffc412b14841b5020618be845a0a1ee70e54f2aa86b3a4d8a9c298ff7ced44
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exeFilesize
216KB
MD578621f1e196497d440afb57f4609fcf9
SHA1eed7c3bb3fc5181b88abeed2204997f350324022
SHA2564a4be110d587421ad50d2b1a38b108fa05f314631066a2e96a1c85cc05814080
SHA5128bcc845b88710528c45df0ccc1ffc4d52663a2e7b870f7d347dacf2a2a698ea8d7ffc412b14841b5020618be845a0a1ee70e54f2aa86b3a4d8a9c298ff7ced44
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exeFilesize
216KB
MD578621f1e196497d440afb57f4609fcf9
SHA1eed7c3bb3fc5181b88abeed2204997f350324022
SHA2564a4be110d587421ad50d2b1a38b108fa05f314631066a2e96a1c85cc05814080
SHA5128bcc845b88710528c45df0ccc1ffc4d52663a2e7b870f7d347dacf2a2a698ea8d7ffc412b14841b5020618be845a0a1ee70e54f2aa86b3a4d8a9c298ff7ced44
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\TrustedInstaller.exeFilesize
216KB
MD578621f1e196497d440afb57f4609fcf9
SHA1eed7c3bb3fc5181b88abeed2204997f350324022
SHA2564a4be110d587421ad50d2b1a38b108fa05f314631066a2e96a1c85cc05814080
SHA5128bcc845b88710528c45df0ccc1ffc4d52663a2e7b870f7d347dacf2a2a698ea8d7ffc412b14841b5020618be845a0a1ee70e54f2aa86b3a4d8a9c298ff7ced44
-
memory/112-76-0x0000000000000000-mapping.dmp
-
memory/300-66-0x0000000000000000-mapping.dmp
-
memory/320-65-0x0000000000000000-mapping.dmp
-
memory/568-75-0x0000000000000000-mapping.dmp
-
memory/952-57-0x0000000000000000-mapping.dmp
-
memory/972-71-0x0000000000000000-mapping.dmp
-
memory/1216-67-0x0000000000000000-mapping.dmp
-
memory/1332-63-0x0000000000000000-mapping.dmp
-
memory/1348-54-0x0000000076531000-0x0000000076533000-memory.dmpFilesize
8KB
-
memory/1388-69-0x0000000000000000-mapping.dmp
-
memory/1560-60-0x0000000000000000-mapping.dmp
-
memory/1588-62-0x0000000000000000-mapping.dmp
-
memory/1824-68-0x0000000000000000-mapping.dmp
-
memory/1980-64-0x0000000000000000-mapping.dmp