Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 18:05
Static task
static1
Behavioral task
behavioral1
Sample
44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe
Resource
win10v2004-20220414-en
General
-
Target
44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe
-
Size
326KB
-
MD5
941fbf1d6026f44f8838e08d1095bdee
-
SHA1
565e92c3563def12743e19ea370330d29ec1bcfd
-
SHA256
44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5
-
SHA512
ee0c85158c347c950606b102659b4c7f55514c506e1b7cd7da4c12c78ca8803ff3983fc97065eee46f67f105eaf13da27d780a56d53ee62d7452c35b38197661
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+thuim.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/9826BEF5A4166E3
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/9826BEF5A4166E3
http://yyre45dbvn2nhbefbmh.begumvelic.at/9826BEF5A4166E3
http://xlowfznrg4wf7dli.ONION/9826BEF5A4166E3
Extracted
C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_RECoVERY_+thuim.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
fqbhqvoxevgk.exepid Process 1920 fqbhqvoxevgk.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
fqbhqvoxevgk.exedescription ioc Process File renamed C:\Users\Admin\Pictures\BackupGroup.raw => C:\Users\Admin\Pictures\BackupGroup.raw.mp3 fqbhqvoxevgk.exe File renamed C:\Users\Admin\Pictures\ExitTest.crw => C:\Users\Admin\Pictures\ExitTest.crw.mp3 fqbhqvoxevgk.exe File renamed C:\Users\Admin\Pictures\StepUse.crw => C:\Users\Admin\Pictures\StepUse.crw.mp3 fqbhqvoxevgk.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1468 cmd.exe -
Drops startup file 3 IoCs
Processes:
fqbhqvoxevgk.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fqbhqvoxevgk.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run fqbhqvoxevgk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\djdrqtyfvlpc = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\fqbhqvoxevgk.exe\"" fqbhqvoxevgk.exe -
Drops file in Program Files directory 64 IoCs
Processes:
fqbhqvoxevgk.exedescription ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\30.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Common Files\System\msadc\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Mail\de-DE\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mouseout.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\cpu.js fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\shuffle_up.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Defender\en-US\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\te.pak fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\COPYING.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_ButtonGraphic.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_RECoVERY_+thuim.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\background.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\icon.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-background.png fqbhqvoxevgk.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\_RECoVERY_+thuim.txt fqbhqvoxevgk.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\_RECoVERY_+thuim.html fqbhqvoxevgk.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\clock.css fqbhqvoxevgk.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt fqbhqvoxevgk.exe -
Drops file in Windows directory 2 IoCs
Processes:
44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exedescription ioc Process File created C:\Windows\fqbhqvoxevgk.exe 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe File opened for modification C:\Windows\fqbhqvoxevgk.exe 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46A49BC1-FE26-11EC-A2A7-5AC3572C4626} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Processes:
fqbhqvoxevgk.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 fqbhqvoxevgk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 fqbhqvoxevgk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 fqbhqvoxevgk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 fqbhqvoxevgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 fqbhqvoxevgk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 fqbhqvoxevgk.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid Process 1352 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fqbhqvoxevgk.exepid Process 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe 1920 fqbhqvoxevgk.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exefqbhqvoxevgk.exeWMIC.exevssvc.exeWMIC.exedescription pid Process Token: SeDebugPrivilege 388 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe Token: SeDebugPrivilege 1920 fqbhqvoxevgk.exe Token: SeIncreaseQuotaPrivilege 816 WMIC.exe Token: SeSecurityPrivilege 816 WMIC.exe Token: SeTakeOwnershipPrivilege 816 WMIC.exe Token: SeLoadDriverPrivilege 816 WMIC.exe Token: SeSystemProfilePrivilege 816 WMIC.exe Token: SeSystemtimePrivilege 816 WMIC.exe Token: SeProfSingleProcessPrivilege 816 WMIC.exe Token: SeIncBasePriorityPrivilege 816 WMIC.exe Token: SeCreatePagefilePrivilege 816 WMIC.exe Token: SeBackupPrivilege 816 WMIC.exe Token: SeRestorePrivilege 816 WMIC.exe Token: SeShutdownPrivilege 816 WMIC.exe Token: SeDebugPrivilege 816 WMIC.exe Token: SeSystemEnvironmentPrivilege 816 WMIC.exe Token: SeRemoteShutdownPrivilege 816 WMIC.exe Token: SeUndockPrivilege 816 WMIC.exe Token: SeManageVolumePrivilege 816 WMIC.exe Token: 33 816 WMIC.exe Token: 34 816 WMIC.exe Token: 35 816 WMIC.exe Token: SeIncreaseQuotaPrivilege 816 WMIC.exe Token: SeSecurityPrivilege 816 WMIC.exe Token: SeTakeOwnershipPrivilege 816 WMIC.exe Token: SeLoadDriverPrivilege 816 WMIC.exe Token: SeSystemProfilePrivilege 816 WMIC.exe Token: SeSystemtimePrivilege 816 WMIC.exe Token: SeProfSingleProcessPrivilege 816 WMIC.exe Token: SeIncBasePriorityPrivilege 816 WMIC.exe Token: SeCreatePagefilePrivilege 816 WMIC.exe Token: SeBackupPrivilege 816 WMIC.exe Token: SeRestorePrivilege 816 WMIC.exe Token: SeShutdownPrivilege 816 WMIC.exe Token: SeDebugPrivilege 816 WMIC.exe Token: SeSystemEnvironmentPrivilege 816 WMIC.exe Token: SeRemoteShutdownPrivilege 816 WMIC.exe Token: SeUndockPrivilege 816 WMIC.exe Token: SeManageVolumePrivilege 816 WMIC.exe Token: 33 816 WMIC.exe Token: 34 816 WMIC.exe Token: 35 816 WMIC.exe Token: SeBackupPrivilege 588 vssvc.exe Token: SeRestorePrivilege 588 vssvc.exe Token: SeAuditPrivilege 588 vssvc.exe Token: SeIncreaseQuotaPrivilege 336 WMIC.exe Token: SeSecurityPrivilege 336 WMIC.exe Token: SeTakeOwnershipPrivilege 336 WMIC.exe Token: SeLoadDriverPrivilege 336 WMIC.exe Token: SeSystemProfilePrivilege 336 WMIC.exe Token: SeSystemtimePrivilege 336 WMIC.exe Token: SeProfSingleProcessPrivilege 336 WMIC.exe Token: SeIncBasePriorityPrivilege 336 WMIC.exe Token: SeCreatePagefilePrivilege 336 WMIC.exe Token: SeBackupPrivilege 336 WMIC.exe Token: SeRestorePrivilege 336 WMIC.exe Token: SeShutdownPrivilege 336 WMIC.exe Token: SeDebugPrivilege 336 WMIC.exe Token: SeSystemEnvironmentPrivilege 336 WMIC.exe Token: SeRemoteShutdownPrivilege 336 WMIC.exe Token: SeUndockPrivilege 336 WMIC.exe Token: SeManageVolumePrivilege 336 WMIC.exe Token: 33 336 WMIC.exe Token: 34 336 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeDllHost.exepid Process 1884 iexplore.exe 216 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 1884 iexplore.exe 1884 iexplore.exe 976 IEXPLORE.EXE 976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exefqbhqvoxevgk.exeiexplore.exedescription pid Process procid_target PID 388 wrote to memory of 1920 388 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe 28 PID 388 wrote to memory of 1920 388 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe 28 PID 388 wrote to memory of 1920 388 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe 28 PID 388 wrote to memory of 1920 388 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe 28 PID 388 wrote to memory of 1468 388 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe 29 PID 388 wrote to memory of 1468 388 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe 29 PID 388 wrote to memory of 1468 388 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe 29 PID 388 wrote to memory of 1468 388 44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe 29 PID 1920 wrote to memory of 816 1920 fqbhqvoxevgk.exe 31 PID 1920 wrote to memory of 816 1920 fqbhqvoxevgk.exe 31 PID 1920 wrote to memory of 816 1920 fqbhqvoxevgk.exe 31 PID 1920 wrote to memory of 816 1920 fqbhqvoxevgk.exe 31 PID 1920 wrote to memory of 1352 1920 fqbhqvoxevgk.exe 40 PID 1920 wrote to memory of 1352 1920 fqbhqvoxevgk.exe 40 PID 1920 wrote to memory of 1352 1920 fqbhqvoxevgk.exe 40 PID 1920 wrote to memory of 1352 1920 fqbhqvoxevgk.exe 40 PID 1920 wrote to memory of 1884 1920 fqbhqvoxevgk.exe 41 PID 1920 wrote to memory of 1884 1920 fqbhqvoxevgk.exe 41 PID 1920 wrote to memory of 1884 1920 fqbhqvoxevgk.exe 41 PID 1920 wrote to memory of 1884 1920 fqbhqvoxevgk.exe 41 PID 1884 wrote to memory of 976 1884 iexplore.exe 43 PID 1884 wrote to memory of 976 1884 iexplore.exe 43 PID 1884 wrote to memory of 976 1884 iexplore.exe 43 PID 1884 wrote to memory of 976 1884 iexplore.exe 43 PID 1920 wrote to memory of 336 1920 fqbhqvoxevgk.exe 44 PID 1920 wrote to memory of 336 1920 fqbhqvoxevgk.exe 44 PID 1920 wrote to memory of 336 1920 fqbhqvoxevgk.exe 44 PID 1920 wrote to memory of 336 1920 fqbhqvoxevgk.exe 44 PID 1920 wrote to memory of 1612 1920 fqbhqvoxevgk.exe 47 PID 1920 wrote to memory of 1612 1920 fqbhqvoxevgk.exe 47 PID 1920 wrote to memory of 1612 1920 fqbhqvoxevgk.exe 47 PID 1920 wrote to memory of 1612 1920 fqbhqvoxevgk.exe 47 -
System policy modification 1 TTPs 2 IoCs
Processes:
fqbhqvoxevgk.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fqbhqvoxevgk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" fqbhqvoxevgk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe"C:\Users\Admin\AppData\Local\Temp\44d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\fqbhqvoxevgk.exeC:\Windows\fqbhqvoxevgk.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1920 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT3⤵
- Opens file in notepad (likely ransom note)
PID:1352
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:976
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\FQBHQV~1.EXE3⤵PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\44D18A~1.EXE2⤵
- Deletes itself
PID:1468
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:588
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD53ad8e790779d1c8c4c00f6d6fa437d86
SHA165cfa9869335992e37951446c3cab34cf9f24dc7
SHA25695af4ab3cd58aaab98c1c380a76df5dd1d5f2dd24f165e350b852c60a411c042
SHA512fae33745398e598ec9a37f63717fadad48ce1165ec3e0e30d9ab5701dc97994cafae6ad21877e75d8dc4d867fcb9bd39ff35e2e4ba8e6b117fbaf85daadb4f2c
-
Filesize
1KB
MD59bd607e418203b660f431b091e246f61
SHA18a5a9c4dec42d968f8f7dfb6db2e63f232e82f05
SHA2560f2071d8d37557931b57a3129f37e80b7880e8021e92de5894cc518dbe5b66ec
SHA512372db7c225e3006e7db0bd94bb409abb351bb256c95d7d52af127844d2b028c7ac28ed1e6edb917de7aa2f33bc88225d0f3ab535253fd53cab8da202412734fa
-
Filesize
64KB
MD5f31061e3534f7918ca1b02e63b5a7002
SHA1d6b324a23f5d969b533e828690b7629ae148396d
SHA256dac24025299733706b92a409123778f0572778baf6e010be5b85389e7852a860
SHA51232f30a16b81867a04660a2115bbe66f5877db2cc5603f4f0b6bd509d3abd2591976de024b797217f0b2852df3ab0e1b7e598158eb7a7cc31de2898171b3a3d33
-
Filesize
326KB
MD5941fbf1d6026f44f8838e08d1095bdee
SHA1565e92c3563def12743e19ea370330d29ec1bcfd
SHA25644d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5
SHA512ee0c85158c347c950606b102659b4c7f55514c506e1b7cd7da4c12c78ca8803ff3983fc97065eee46f67f105eaf13da27d780a56d53ee62d7452c35b38197661
-
Filesize
326KB
MD5941fbf1d6026f44f8838e08d1095bdee
SHA1565e92c3563def12743e19ea370330d29ec1bcfd
SHA25644d18a5d79c430787fd8021c4915e29ec41059f12f80559820d73e232b86cca5
SHA512ee0c85158c347c950606b102659b4c7f55514c506e1b7cd7da4c12c78ca8803ff3983fc97065eee46f67f105eaf13da27d780a56d53ee62d7452c35b38197661