Analysis
-
max time kernel
151s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 17:37
Static task
static1
Behavioral task
behavioral1
Sample
44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe
Resource
win10v2004-20220414-en
General
-
Target
44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe
-
Size
345KB
-
MD5
3da92cb965ec8d47590d5aab83dc0fb2
-
SHA1
d88b5a80ee1018ade3f38d7c7859e56b9639ab86
-
SHA256
44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788
-
SHA512
1a5ebcd10a6265dcc237a0e9963c8d8ad5c45f9ecd3b10bc79ee9d2b61bdbe8c2dd090f97d23f93b9085c28680191e67e8844951ea5340566235d9c723aeb1e9
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECoVERY_+ilcgr.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/5C846B46B0CBE43D
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/5C846B46B0CBE43D
http://yyre45dbvn2nhbefbmh.begumvelic.at/5C846B46B0CBE43D
http://xlowfznrg4wf7dli.ONION/5C846B46B0CBE43D
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_RECoVERY_+ilcgr.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
xmaujoccehsa.exepid Process 1880 xmaujoccehsa.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 956 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
xmaujoccehsa.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run xmaujoccehsa.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\gvxkrehemgpx = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\xmaujoccehsa.exe\"" xmaujoccehsa.exe -
Drops file in Program Files directory 64 IoCs
Processes:
xmaujoccehsa.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\VERSION.txt xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Journal\es-ES\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\flyout_background.png xmaujoccehsa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\10.png xmaujoccehsa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_ButtonGraphic.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Defender\es-ES\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\picturePuzzle.js xmaujoccehsa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\HeartsMCE.png xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-3.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_snow.png xmaujoccehsa.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt xmaujoccehsa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\blafdoc.css xmaujoccehsa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkTSFrame.png xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_150.png xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\default_thumb.jpg xmaujoccehsa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_down.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\Common Files\System\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_content-background.png xmaujoccehsa.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg xmaujoccehsa.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_70.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_SelectionSubpicture.png xmaujoccehsa.exe File opened for modification C:\Program Files\DVD Maker\_RECoVERY_+ilcgr.html xmaujoccehsa.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_RECoVERY_+ilcgr.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_ring_docked.png xmaujoccehsa.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_RECoVERY_+ilcgr.txt xmaujoccehsa.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_RECoVERY_+ilcgr.html xmaujoccehsa.exe -
Drops file in Windows directory 2 IoCs
Processes:
44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exedescription ioc Process File created C:\Windows\xmaujoccehsa.exe 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe File opened for modification C:\Windows\xmaujoccehsa.exe 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
xmaujoccehsa.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 xmaujoccehsa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 xmaujoccehsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 xmaujoccehsa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 xmaujoccehsa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 xmaujoccehsa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 xmaujoccehsa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
xmaujoccehsa.exepid Process 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe 1880 xmaujoccehsa.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exexmaujoccehsa.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1768 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe Token: SeDebugPrivilege 1880 xmaujoccehsa.exe Token: SeIncreaseQuotaPrivilege 540 WMIC.exe Token: SeSecurityPrivilege 540 WMIC.exe Token: SeTakeOwnershipPrivilege 540 WMIC.exe Token: SeLoadDriverPrivilege 540 WMIC.exe Token: SeSystemProfilePrivilege 540 WMIC.exe Token: SeSystemtimePrivilege 540 WMIC.exe Token: SeProfSingleProcessPrivilege 540 WMIC.exe Token: SeIncBasePriorityPrivilege 540 WMIC.exe Token: SeCreatePagefilePrivilege 540 WMIC.exe Token: SeBackupPrivilege 540 WMIC.exe Token: SeRestorePrivilege 540 WMIC.exe Token: SeShutdownPrivilege 540 WMIC.exe Token: SeDebugPrivilege 540 WMIC.exe Token: SeSystemEnvironmentPrivilege 540 WMIC.exe Token: SeRemoteShutdownPrivilege 540 WMIC.exe Token: SeUndockPrivilege 540 WMIC.exe Token: SeManageVolumePrivilege 540 WMIC.exe Token: 33 540 WMIC.exe Token: 34 540 WMIC.exe Token: 35 540 WMIC.exe Token: SeIncreaseQuotaPrivilege 540 WMIC.exe Token: SeSecurityPrivilege 540 WMIC.exe Token: SeTakeOwnershipPrivilege 540 WMIC.exe Token: SeLoadDriverPrivilege 540 WMIC.exe Token: SeSystemProfilePrivilege 540 WMIC.exe Token: SeSystemtimePrivilege 540 WMIC.exe Token: SeProfSingleProcessPrivilege 540 WMIC.exe Token: SeIncBasePriorityPrivilege 540 WMIC.exe Token: SeCreatePagefilePrivilege 540 WMIC.exe Token: SeBackupPrivilege 540 WMIC.exe Token: SeRestorePrivilege 540 WMIC.exe Token: SeShutdownPrivilege 540 WMIC.exe Token: SeDebugPrivilege 540 WMIC.exe Token: SeSystemEnvironmentPrivilege 540 WMIC.exe Token: SeRemoteShutdownPrivilege 540 WMIC.exe Token: SeUndockPrivilege 540 WMIC.exe Token: SeManageVolumePrivilege 540 WMIC.exe Token: 33 540 WMIC.exe Token: 34 540 WMIC.exe Token: 35 540 WMIC.exe Token: SeBackupPrivilege 1732 vssvc.exe Token: SeRestorePrivilege 1732 vssvc.exe Token: SeAuditPrivilege 1732 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exexmaujoccehsa.exedescription pid Process procid_target PID 1768 wrote to memory of 1880 1768 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe 26 PID 1768 wrote to memory of 1880 1768 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe 26 PID 1768 wrote to memory of 1880 1768 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe 26 PID 1768 wrote to memory of 1880 1768 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe 26 PID 1768 wrote to memory of 956 1768 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe 27 PID 1768 wrote to memory of 956 1768 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe 27 PID 1768 wrote to memory of 956 1768 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe 27 PID 1768 wrote to memory of 956 1768 44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe 27 PID 1880 wrote to memory of 540 1880 xmaujoccehsa.exe 29 PID 1880 wrote to memory of 540 1880 xmaujoccehsa.exe 29 PID 1880 wrote to memory of 540 1880 xmaujoccehsa.exe 29 PID 1880 wrote to memory of 540 1880 xmaujoccehsa.exe 29 -
System policy modification 1 TTPs 2 IoCs
Processes:
xmaujoccehsa.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xmaujoccehsa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" xmaujoccehsa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe"C:\Users\Admin\AppData\Local\Temp\44f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\xmaujoccehsa.exeC:\Windows\xmaujoccehsa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1880 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\44F51A~1.EXE2⤵
- Deletes itself
PID:956
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345KB
MD53da92cb965ec8d47590d5aab83dc0fb2
SHA1d88b5a80ee1018ade3f38d7c7859e56b9639ab86
SHA25644f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788
SHA5121a5ebcd10a6265dcc237a0e9963c8d8ad5c45f9ecd3b10bc79ee9d2b61bdbe8c2dd090f97d23f93b9085c28680191e67e8844951ea5340566235d9c723aeb1e9
-
Filesize
345KB
MD53da92cb965ec8d47590d5aab83dc0fb2
SHA1d88b5a80ee1018ade3f38d7c7859e56b9639ab86
SHA25644f51a4ab64f898405e1aab1115e2509437bfa827ca2d3ce9d78a54d56618788
SHA5121a5ebcd10a6265dcc237a0e9963c8d8ad5c45f9ecd3b10bc79ee9d2b61bdbe8c2dd090f97d23f93b9085c28680191e67e8844951ea5340566235d9c723aeb1e9