Analysis
-
max time kernel
152s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 11:46
Static task
static1
Behavioral task
behavioral1
Sample
457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe
Resource
win10v2004-20220414-en
General
-
Target
457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe
-
Size
352KB
-
MD5
1326d2b63d8846f40cddb4971ac57782
-
SHA1
a023a792e93e936dd0b297fdf680fb429e46ee41
-
SHA256
457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c
-
SHA512
56b2f907e45ec0418436430090807b12c7fde920a8cd3f065a08f18208b5be92af64bdb56069973996933dcb57e1ac7f123e724b71e71b7dad4894047f9089ca
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+rvrau.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/FD26DACA73588999
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/FD26DACA73588999
http://yyre45dbvn2nhbefbmh.begumvelic.at/FD26DACA73588999
http://xlowfznrg4wf7dli.ONION/FD26DACA73588999
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+rvrau.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
mxsywmbppxkm.exemxsywmbppxkm.exepid Process 2608 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exemxsywmbppxkm.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation mxsywmbppxkm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mxsywmbppxkm.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN mxsywmbppxkm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\viywtxt = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\mxsywmbppxkm.exe" mxsywmbppxkm.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exemxsywmbppxkm.exedescription pid Process procid_target PID 2904 set thread context of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2608 set thread context of 3780 2608 mxsywmbppxkm.exe 84 -
Drops file in Program Files directory 64 IoCs
Processes:
mxsywmbppxkm.exedescription ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tr-TR\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bg.pak mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\DisconnectEnable.dwg mxsywmbppxkm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nl-NL\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nb-NO\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\en-US\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\de-DE\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\msadc\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bn.pak mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\_ReCoVeRy_+rvrau.png mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_ReCoVeRy_+rvrau.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt mxsywmbppxkm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\_ReCoVeRy_+rvrau.html mxsywmbppxkm.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt mxsywmbppxkm.exe -
Drops file in Windows directory 2 IoCs
Processes:
457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exedescription ioc Process File created C:\Windows\mxsywmbppxkm.exe 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe File opened for modification C:\Windows\mxsywmbppxkm.exe 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mxsywmbppxkm.exepid Process 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe 3780 mxsywmbppxkm.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exemxsywmbppxkm.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 2676 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe Token: SeDebugPrivilege 3780 mxsywmbppxkm.exe Token: SeIncreaseQuotaPrivilege 716 WMIC.exe Token: SeSecurityPrivilege 716 WMIC.exe Token: SeTakeOwnershipPrivilege 716 WMIC.exe Token: SeLoadDriverPrivilege 716 WMIC.exe Token: SeSystemProfilePrivilege 716 WMIC.exe Token: SeSystemtimePrivilege 716 WMIC.exe Token: SeProfSingleProcessPrivilege 716 WMIC.exe Token: SeIncBasePriorityPrivilege 716 WMIC.exe Token: SeCreatePagefilePrivilege 716 WMIC.exe Token: SeBackupPrivilege 716 WMIC.exe Token: SeRestorePrivilege 716 WMIC.exe Token: SeShutdownPrivilege 716 WMIC.exe Token: SeDebugPrivilege 716 WMIC.exe Token: SeSystemEnvironmentPrivilege 716 WMIC.exe Token: SeRemoteShutdownPrivilege 716 WMIC.exe Token: SeUndockPrivilege 716 WMIC.exe Token: SeManageVolumePrivilege 716 WMIC.exe Token: 33 716 WMIC.exe Token: 34 716 WMIC.exe Token: 35 716 WMIC.exe Token: 36 716 WMIC.exe Token: SeIncreaseQuotaPrivilege 716 WMIC.exe Token: SeSecurityPrivilege 716 WMIC.exe Token: SeTakeOwnershipPrivilege 716 WMIC.exe Token: SeLoadDriverPrivilege 716 WMIC.exe Token: SeSystemProfilePrivilege 716 WMIC.exe Token: SeSystemtimePrivilege 716 WMIC.exe Token: SeProfSingleProcessPrivilege 716 WMIC.exe Token: SeIncBasePriorityPrivilege 716 WMIC.exe Token: SeCreatePagefilePrivilege 716 WMIC.exe Token: SeBackupPrivilege 716 WMIC.exe Token: SeRestorePrivilege 716 WMIC.exe Token: SeShutdownPrivilege 716 WMIC.exe Token: SeDebugPrivilege 716 WMIC.exe Token: SeSystemEnvironmentPrivilege 716 WMIC.exe Token: SeRemoteShutdownPrivilege 716 WMIC.exe Token: SeUndockPrivilege 716 WMIC.exe Token: SeManageVolumePrivilege 716 WMIC.exe Token: 33 716 WMIC.exe Token: 34 716 WMIC.exe Token: 35 716 WMIC.exe Token: 36 716 WMIC.exe Token: SeBackupPrivilege 3016 vssvc.exe Token: SeRestorePrivilege 3016 vssvc.exe Token: SeAuditPrivilege 3016 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exemxsywmbppxkm.exemxsywmbppxkm.exedescription pid Process procid_target PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2904 wrote to memory of 2676 2904 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 80 PID 2676 wrote to memory of 2608 2676 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 81 PID 2676 wrote to memory of 2608 2676 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 81 PID 2676 wrote to memory of 2608 2676 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 81 PID 2676 wrote to memory of 2228 2676 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 82 PID 2676 wrote to memory of 2228 2676 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 82 PID 2676 wrote to memory of 2228 2676 457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe 82 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 2608 wrote to memory of 3780 2608 mxsywmbppxkm.exe 84 PID 3780 wrote to memory of 716 3780 mxsywmbppxkm.exe 85 PID 3780 wrote to memory of 716 3780 mxsywmbppxkm.exe 85 -
System policy modification 1 TTPs 2 IoCs
Processes:
mxsywmbppxkm.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mxsywmbppxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" mxsywmbppxkm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe"C:\Users\Admin\AppData\Local\Temp\457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe"C:\Users\Admin\AppData\Local\Temp\457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\mxsywmbppxkm.exeC:\Windows\mxsywmbppxkm.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\mxsywmbppxkm.exeC:\Windows\mxsywmbppxkm.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3780 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\457D3D~1.EXE3⤵PID:2228
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD51326d2b63d8846f40cddb4971ac57782
SHA1a023a792e93e936dd0b297fdf680fb429e46ee41
SHA256457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c
SHA51256b2f907e45ec0418436430090807b12c7fde920a8cd3f065a08f18208b5be92af64bdb56069973996933dcb57e1ac7f123e724b71e71b7dad4894047f9089ca
-
Filesize
352KB
MD51326d2b63d8846f40cddb4971ac57782
SHA1a023a792e93e936dd0b297fdf680fb429e46ee41
SHA256457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c
SHA51256b2f907e45ec0418436430090807b12c7fde920a8cd3f065a08f18208b5be92af64bdb56069973996933dcb57e1ac7f123e724b71e71b7dad4894047f9089ca
-
Filesize
352KB
MD51326d2b63d8846f40cddb4971ac57782
SHA1a023a792e93e936dd0b297fdf680fb429e46ee41
SHA256457d3ded5e8d1dc1c49cf468c03743735c05fb0e7bea643380c5f9e02064f67c
SHA51256b2f907e45ec0418436430090807b12c7fde920a8cd3f065a08f18208b5be92af64bdb56069973996933dcb57e1ac7f123e724b71e71b7dad4894047f9089ca